Abstract is missing.
- Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storageMuhammad I. H. Sukmana, Kennedy A. Torkura, Christoph Meinel, Hendrik Graupner. 3-10 [doi]
- A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access controlNazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma. 11-18 [doi]
- Secure and efficient proof of ownership for deduplicated cloud storageJay Dave, Parvez Faruki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur. 19-26 [doi]
- Differential ananlysis of 3 round KuznyechikEvgeniya Ishchukova, Ekaterina Tolomanenko, Ludmila K. Babenko. 29-36 [doi]
- An enhanced parallel version of RSA public key crypto based algorithm using openMPRahul Saxena, Monika Jain, Dushyant Singh, Ashutosh Kushwah. 37-42 [doi]
- A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithmsLiudmila Babenko, Ilya Pisarev, Oleg B. Makarevich. 45-50 [doi]
- Privacy preserving two-server Diffie-Hellman key exchange protocolDurbadal Chattaraj, Monalisa Sarma, Debasis Samanta. 51-58 [doi]
- Element-key table based complex key generation (E-CKG) for IoT based health care networksShailja Dahiya, Manoj Kumar Bohra. 59-64 [doi]
- Attribute-based approach of defining the secure behavior of automata objectsFedor Novikov, Ludmila N. Fedorchenko, Vladimir I. Vorobiev, Roza Fatkieva, Dmitriy K. Levonevskiy. 67-72 [doi]
- Network security architectures for VANETMaxim O. Kalinin, Vasiliy Krundyshev, Peter D. Zegzhda, Viacheslav Belenko. 73-79 [doi]
- Resilient complex event processing in IoT using side-channel informationRajesh Kumar Shrivastava, Sanket Mishra, Srimanta Barua, Chittaranjan Hota. 80-87 [doi]
- A comparative analysis of machine learning techniques for botnet detectionAnkit Bansal, Sudipta Mahapatra. 91-98 [doi]
- Integer overflow vulnerabilities detection in software binary codeRoman Demidov, Alexander I. Pechenkin, Peter D. Zegzhda. 101-106 [doi]
- A novel malware analysis for malware detection and classification using machine learning algorithmsKamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera. 107-113 [doi]
- Collaborative representation of Grassmann manifold projection metric for robust multi-spectral face recognitionNarayan Vetrekar, Kiran B. Raja, R. Raghavendra, Rajendra S. Gad, Christoph Busch. 117-124 [doi]
- Extended multi-spectral imaging for gender classification based on image setNarayan Vetrekar, R. Raghavendra, Kiran B. Raja, Rajendra S. Gad, Christoph Busch. 125-130 [doi]
- Analysis of ways to secure group control for autonomous mobile robotsAlexander S. Basan, Elena Basan, Oleg B. Makarevich. 134-139 [doi]
- Parameters of the two-stage synchronization algorithm for the quantum key distribution systemKonstantin Rumyantsev, Evgeny Rudinsky. 140-147 [doi]
- Flooding in secure wireless sensor networks: Student contributionJimmy Bondu, Anupal Mishra, Vijay Laxmi, Manoj Singh Gaur. 151-156 [doi]
- Unmasking of source identity, a step beyond in cyber forensicRachana Yogesh Patil, Satish R. Devane. 157-164 [doi]
- Abnormal leakage of energy in battery-based IoT-devicesRaksha Nawal, Rajbir Kaur. 165-170 [doi]
- SMITE: an SDN and MPLS integrated traceback mechanismPynbianglut Hadem, D. K. Saikia. 171-177 [doi]
- Performance impact of topology poisoning attack in SDN and its countermeasureNivindar Kaur, Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava. 179-184 [doi]
- A framework for data security in cloud using collaborative intrusion detection schemeUpasana T. Nagar, Priyadarsi Nanda, Xiangjian He, Zhiyuan Thomas Tan. 188-193 [doi]
- Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloudKamalakanta Sethi, Anish Chopra, Padmalochan Bera, Bata Krishna Tripathy. 194-199 [doi]
- The duality principle in the theory of development generalized A-M knapsack cryptosystemsValeriy O. Osipyan, Valeriy S. Tlusten, Nina V. Laktionova, Nadezhda V. Vakhrusheva. 200-205 [doi]
- Light-weight hash algorithms using GRP instructionMahaveer Prasad Soni, Alwyn R. Pais. 206-211 [doi]
- Proxy visible re-encryption scheme with application to e-mail forwardingGaurav Pareek, Purushothama B. R. 212-217 [doi]
- Component-centric application-driven framework: towards taming privilege separation in AndroidSwati Gaur, Sudhanshu Gaur. 218-223 [doi]
- Feasibility of idle port scanning using RST rate-limitRonak Odhaviya, Anamika Modi, Rahi Sheth, Anish Mathuria. 224-228 [doi]
- Identification of gait data using machine learning technique to categories human locomotionAnubha Parashar, Apoorva Parashar, Somya Goyal. 229-234 [doi]
- Practical challenges in building fake services with the record and play approachJani Tammi, Sampsa Rauti, Ville Leppänen. 235-239 [doi]
- Malware detection by meta-information of used system functionsLudmila K. Babenko, Alexey Kirillov. 240-244 [doi]
- Internal interface diversification with multiple fake interfacesSampsa Rauti, Ville Leppänen. 245-250 [doi]
- Anomaly detection survey for information securityHarsurinder kaur, Husanbir Singh Pannu. 251-258 [doi]
- Image encryption using wavelet transform over finite fieldVivek P. Khalane, Umesh Bhadade. 257-261 [doi]
- Analysis and comparison of electronic digital signature state standards GOST R 34.10-1994, GOST R 34.10-2001 and GOST R 34.10-2012Antonina Komarova, Alexander Menshchikov, Tatyana Klyaus, Anatoly Korobeynikov, Yurij Gatchin, Nina Tishukova. 262-267 [doi]
- Cooperation based defense mechanism against selfish nodes in DTNsJaina P. Bhoiwala, Rutvij H. Jhaveri. 268-273 [doi]
- Insider threat detection using principal component analysis and self-organising mapNaghmeh Moradpoor, Martyn Brown, Gordon Russell. 274-279 [doi]
- Detecting Android application malicious behaviors based on the analysis of control flows and data flowsPeter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Andrew Dremov. 280-283 [doi]
- Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015)Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev. 287-290 [doi]
- Approxhash: delay, power and area optimized approximate hash functions for cryptography applicationsSunil Dutt, Bikram Paul, Anshu Chauhan, Sukumar Nandi, Gaurav Trivedi. 291-294 [doi]
- Modeling of information systems to their security evaluationDmitry P. Zegzhda, Peter D. Zegzhda, Alexander I. Pechenkin, Maria A. Poltavtseva. 295-298 [doi]
- Evaluating machine learning algorithms for detection of interest flooding attack in named data networkingNaveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava. 299-302 [doi]
- 'Global view' in SDN: existing implementation, vulnerabilities & threatsAjay Nehra, Meenakshi Tripathi, Manoj Singh Gaur. 303-306 [doi]
- Language usage on Twitter predicts crime ratesAbdulaziz Almehmadi, Zeinab Joudaki, Roozbeh Jalali. 307-310 [doi]
- Permission recommender system for AndroidAnkur Shukla, Divya Vikash, Bharavi Mishra, Poonam Gera. 311-314 [doi]
- Secret sharing scheme based on Cauchy matrix for data outsourcingVishnu Prasad C, Arun Raj Kumar P. 315-318 [doi]
- CAP: collaborative attack on pastrySrikanta Pradhan, Somanath Tripathy. 319-322 [doi]