Abstract is missing.
- A Novel Approach for a Hardware-Based Secure Process Isolation in an Embedded SystemSunil Malipatlolla. 1-9 [doi]
- Signature Embedding in the Functional Description of Reversible CircuitAnimesh Roy, Debasis Mitra. 10-17 [doi]
- Detecting Laser Fault Injection for Smart Cards Using Security AutomataGuillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet. 18-29 [doi]
- Virtual World Authentication Using the Smart Card Web ServerLazaros Kyrillidis, Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis. 30-41 [doi]
- A More Efficient and Secure Authentication Scheme over Insecure Networks Using Smart CardsChandra Sekhar Vorugunti, Mrudula Sarvabhatla. 42-51 [doi]
- A Combined Crypto-steganographic Approach for Information Hiding in Audio Signals Using Sub-band Coding, Compressive Sensing and Singular Value DecompositionG. Jyothish Lal, V. K. Veena, K. P. Soman. 52-62 [doi]
- Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known AttacksL. N. Pradeep, Aniruddha Bhattacharjya. 63-69 [doi]
- Emulating a High Interaction Honeypot to Monitor Intrusion ActivityAnil Gopalakrishna, Alwyn Roshan Pais. 70-76 [doi]
- On Pseudo-random Number Generation Using Elliptic Curve CryptographyManali Dubal, Aaradhana Deshmukh. 77-89 [doi]
- Exploiting Functional Models to Assess the Security Aspect in Embedded System DesignIngo Stierand, Sunil Malipatlolla. 90-97 [doi]
- Design of CAPTCHA Script for Indian Regional WebsitesM. Tariq Banday, Shafiya Afzal Sheikh. 98-109 [doi]
- A Survey of Traditional and Cloud Specific Security IssuesSumitra Binu, Mohammed Misbahuddin. 110-129 [doi]
- A Chaos Based Method for Efficient Cryptographic S-box DesignMusheer Ahmad, Hitesh Chugh, Avish Goel, Prateek Singla. 130-137 [doi]
- A Multicast Authentication Protocol (MAP) for Dynamic Multicast Groups in Wireless NetworksParag J. Jambhulkar, Soumyadev Maity, Ramesh C. Hansdah. 138-149 [doi]
- Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworksPallavi Khatri, Shashikala Tapaswi, Udai P. Verma. 150-161 [doi]
- A Novel Approach for Monitoring SQL Anti-Forensic Attacks Using Pattern Matching for Digital Forensic InvestigationVaibhav T. Patil, Amrita A. Manjrekar. 162-167 [doi]
- Robust BPSO and Scene Change Based Digital Video Watermarking Algorithm in DWT-DFT-SVD DomainRahim Ansari, Mrutyunjayya Devanalamath, Maher Hussain, V. Punya Prabha. 168-178 [doi]
- Slide Attacks against Iterated Hill CiphersLiam Keliher, Samuel Thibodeau. 179-190 [doi]
- Efficient Hierarchical Key Management Scheme Based on Polynomial ConstructionB. R. Purushothama, B. B. Amberker. 191-202 [doi]
- Hand Vein Authentication System Using Dynamic ROIMunaga V. N. K. Prasad, Ilaiah Kavati, Kanavu Ravindra. 203-212 [doi]
- Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay TriangulationIlaiah Kavati, Munaga V. N. K. Prasad, Chakravarthy Bhagvati. 213-222 [doi]
- Short Attribute-Based Group Signature without Random Oracles with Attribute AnonymitySyed Taqi Ali, B. B. Amberker. 223-235 [doi]
- Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Using Hash FunctionAshok Kumar Das, Vanga Odelu, Adrijit Goswami. 236-242 [doi]
- Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for Hierarchical Wireless Sensor NetworksAshok Kumar Das, Santanu Chatterjee, Jamuna Kanta Sing. 243-254 [doi]
- VM Profile Based Optimized Network Attack Pattern Detection Scheme for DDOS Attacks in CloudSanchika Gupta, Padam Kumar. 255-261 [doi]
- Implementation and Embellishment of Prevention of Keylogger Spyware AttacksMohammad Wazid, Robin Sharma, Avita Katal, R. H. Goudar, Priyanka Bhakuni, Asit Tyagi. 262-271 [doi]
- Data Anonymization According to the Combination of Attributes on Social Network SitesSanaz Kavianpour, Bharanidharan Shanmugam, Zuraini Ismail. 272-280 [doi]
- Secure Multimedia Transmission in P2P Using Recurence Relation and Evolutionary AlgorithmRamesh Shahabadkar, Ramchandra V. Pujeri. 281-292 [doi]
- Hybrid Approach for Improvising Credit Card Fraud Detection Based on Collective Animal Behaviour and SVMV. Dheepa, R. Dhanapal. 293-302 [doi]
- Recent Trends in Collection of Software Forensics Artifacts: Issues and ChallengesDeepak Gupta, Babu M. Mehtre. 303-312 [doi]
- Service Dependencies-Aware Policy Enforcement Framework Based on Hierarchical Colored Petri NetYosra Ben Mustapha, Hervé Debar. 313-321 [doi]
- Monitoring Information Leakage in a Web BrowserNemisha Sharma, Swati Kare, Sanket Chichani, Vidhi Naredi, Jyoti Nandimath, Arun Mishra, Arati Dixit. 322-329 [doi]
- Securing Biometric Data with Visual Cryptography and SteganographyDeepak Aeloor, Amrita A. Manjrekar. 330-340 [doi]
- Forensics Analysis of Sandboxie ArtifactsDeepak Gupta, B. M. Mehte. 341-352 [doi]
- An Improved Secure Communication Scheme Using Adaptive Parameter SynchronizationArti Dwivedi, Ashok Kumar Mittal, Suneet Dwivedi. 353-365 [doi]
- A Side View Based Video in Video Watermarking Using DWT and Hilbert TransformLoganathan Agilandeeswari, K. Ganesan, K. Muralibabu. 366-377 [doi]
- Malware Detection Using API Function Frequency with Ensemble Based ClassifierPratiksha Natani, Deepti Vidyarthi. 378-388 [doi]
- Privacy Issues in Single and Multi-hop Wireless Mesh NetworkSagar Kakade, Ravi Sawant, Deepak Chatrabhuj Karia. 389-396 [doi]
- Scalable Key Transport Protocol Using Chinese Remainder TheoremManisha Y. Joshi, R. S. Bichkar. 397-402 [doi]