Abstract is missing.
- Collaborative Approach for Data Integrity Verification in Cloud ComputingRajat Saxena, Somnath Dey. 1-15 [doi]
- EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor NetworksC. R. Yamuna Devi, B. Shivaraj, S. H. Manjula, K. R. Venugopal, Lalit M. Patnaik. 16-31 [doi]
- A Security Framework for Multi-authority Based e-Sealed Bid Auction SystemSourav Sinha, Mamata Jenamani. 32-44 [doi]
- Analysis of Semantic Attacks in Online Social NetworksK. P. Krishna Kumar, G. Geethakumari. 45-56 [doi]
- Enhanced Security of PHR System in Cloud Using Prioritized Level Based EncryptionD. Sangeetha, Vaidehi Vijayakumar, Valliammai Thirunavukkarasu, Aiswarya Ramesh. 57-69 [doi]
- MM-SOAR: Modified SOAR Protocol Using Multiple Metrics for Wireless Mesh NetworkAnuradha Jadiya, Deepak Chatrabhuj Karia. 70-78 [doi]
- Clustering Based Routing Strategies for Energy Management in Ad-Hoc NetworksDeepak Chatrabhuj Karia, Shravanee Shinde. 79-90 [doi]
- Virtual Machine Isolation - A Survey on the Security of Virtual MachinesR. Jithin, Priya Chandran. 91-102 [doi]
- Trust Based VM Consolidation in Cloud Data CentersT. R. Venugopal Anandharajan, Marcharla Anjaneyulu Bhagyaveni. 103-114 [doi]
- A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc NetworksR. Deepa, S. Swamynathan. 115-126 [doi]
- Chain Routing for Convergecast Small Scale Wireless Sensor NetworksC. R. Yamuna Devi, Deepak Sunder, S. H. Manjula, K. R. Venugopal, Lalit M. Patnaik. 127-138 [doi]
- A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud EnvironmentLovejit Singh, Sarbjeet Singh. 139-150 [doi]
- Autonomic SLA Management in Cloud Computing ServicesS. Anithakumari, K. Chandra Sekaran. 151-159 [doi]
- A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Coding, Reduced SVD, Over Complete Dictionary and L1 OptimizationG. Jyothish Lal, V. K. Veena. 160-171 [doi]
- Compressive Sensing Based Audio Scrambling Using Arnold TransformNishanth Augustine, Sudhish N. George, P. P. Deepthi. 172-183 [doi]
- Cryptanalysis of Two Authentication Scheme for DRM SystemDheerendra Mishra, Sourav Mukhopadhyay. 184-191 [doi]
- Improving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property VerificationGermain Jolly, Sylvain Vernois, Jean-Luc Lambert. 192-201 [doi]
- Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor FeaturesMunaga V. N. K. Prasad, Ilaiah Kavati, B. Adinarayana. 202-210 [doi]
- A New Variant of Algebraic AttackDibyendu Roy, Pratish Datta, Sourav Mukhopadhyay. 211-222 [doi]
- A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box)Muhammad Asif Khan, Varun Jeoti. 223-230 [doi]
- On the Extensions of (k, n)*-Visual Cryptographic SchemesKanakkath Praveen, K. Rajeev, M. Sethumadhavan. 231-238 [doi]
- A Graph Data Model for Attack Graph Generation and AnalysisMridul Sankar Barik, Chandan Mazumdar. 239-250 [doi]
- Computationally Perfect Secret Sharing Scheme Based on Error-Correcting CodesAppala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah. 251-262 [doi]
- Warfare Message Communication in Tactical WMN Using HWMPJayalakshmi G. Naragund, R. M. Banakar. 263-274 [doi]
- Metadata Attribute Based Cipher-Key Generation System in CloudR. Anitha, Saswati Mukherjee. 275-287 [doi]
- Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart CardDheerendra Mishra, Sourav Mukhopadhyay. 288-297 [doi]
- Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day AttacksRatinder Kaur, Maninder Singh. 298-309 [doi]
- A Theoretical Study on Access Control Model in Federated SystemsAnant V. Nimkar, Soumya K. Ghosh. 310-321 [doi]
- CASSHH - Case Adaptive SSH HoneypotAdrian Pauna, Victor Valeriu Patriciu. 322-333 [doi]
- Improved Detection of P2P Botnets through Network Behavior AnalysisShree Garg, Anil K. Sarje, Sateesh Kumar Peddoju. 334-345 [doi]
- SLASS: Secure Login against Shoulder SurfingNilesh Chakraborty, Samrat Mondal. 346-357 [doi]
- Differential Execution Analysis for Obfuscation ReductionR. Reno Robert. 358-369 [doi]
- Emergency Aware, Non-invasive, Personalized Access Control Framework for IMDsMonika Darji, Bhushan Trivedi. 370-381 [doi]
- Index Page Based EDoS Attacks in Infrastructure CloudBhavna Saini, Gaurav Somani. 382-395 [doi]
- Privacy Preserving Ranked Keyword Search over Encrypted Cloud DataDinesh Nepolean, I. Karthik, Mu. Preethi, Rahul Goyal, M. Kathirvel Vanethi. 396-403 [doi]
- Combining the X.509 and the SAML Federated Identity Management SystemsMarcus Hardt, Arsen Hayrapetyan, Paul Millar, Shiraz Memon. 404-415 [doi]
- Analysis of Electronic Voting Protocol Using Strand Space ModelVenkatasamy Sureshkumar, Ramalingam Anitha. 416-427 [doi]
- Seamless Handoff of Ping-Pong Calls in Mobile Wimax NetworksBalu Sridevi, G. V. Shirley Julia, S. Rajaram. 428-439 [doi]
- Static Malware Analysis Using Machine Learning MethodsHiran V. Nath, Babu M. Mehtre. 440-450 [doi]
- Making an Application Provenance-Aware through UML - A General SchemeP. Badharudheen, Anu Mary Chacko, S. D. Madhu Kumar. 451-460 [doi]
- Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASSBalasubramanian Chelliah, S. Geetha. 461-472 [doi]
- A Novel Cloud Based NIDPS for SmartphonesVijay Anand Pandian, T. Gireesh Kumar. 473-484 [doi]
- Preserving Database Privacy in Cloud ComputingSaed Alrabaee, Khaled Khateeb, Fawaz A. Khasawneh. 485-495 [doi]
- A Survey on Wi-Fi Protocols: WPA and WPA2Mahmoud Khasawneh, Izadeen Kajman, Rashed Alkhudaidy, Anwar Althubyani. 496-511 [doi]
- On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q = p, prime)M. Sindhu, M. Sethumadhavan. 512-519 [doi]
- Implementation of an Elliptic Curve Based Message Authentication Code for Constrained EnvironmentsP. Jilna, P. P. Deepthi. 520-529 [doi]
- A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel DisplacementQuist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor. 530-539 [doi]
- A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle TechniqueMusheer Ahmad, Parvez Mahmood Khan, Mohd. Zeeshan Ansari. 540-550 [doi]
- Experimental Analysis on Access Control Using Trust Parameter for Social NetworkSaumya Omanakuttan, Madhumita Chatterjee. 551-562 [doi]