Abstract is missing.
- Computing Mod with a Variable Lookup TableMark A. Will, Ryan K. L. Ko. 3-17 [doi]
- Mutual Authentication Based on HECC for RFID Implant SystemsAsha Liza John, Sabu M. Thampi. 18-29 [doi]
- On the Use of Asynchronous Cellular Automata in Symmetric-Key CryptographyBiswanath Sethi, Sukanta Das. 30-41 [doi]
- A Random Key Generation Scheme Using Primitive Polynomials over GF(2)Inderjeet Singh, Alwyn R. Pais. 42-51 [doi]
- Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting SystemP. Sanyasi Naidu, Reena Kharat. 52-62 [doi]
- Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in CloudAnurag Singh Tomar, Shashi Kant Shankar, Manmohan Sharma, Aditya Bakshi. 63-73 [doi]
- Differential Fault Analysis on Tiaoxin and AEGIS Family of CiphersPrakash Dey, Raghvendra Singh Rohit, Santanu Sarkar, Avishek Adhikari. 74-86 [doi]
- A Comparison of Diffusion Properties of Salsa, ChaCha, and MCC CoreRajeev Sobti, G. Geetha. 87-98 [doi]
- A Secure Keyword Ordered Multiuser Searchable Encryption FrameworkKulvaibhav Kaushik, Vijayaraghavan Varadharajan. 99-111 [doi]
- Cryptographic Assessment of SSL/TLS Servers Popular in IndiaPrakhar Jain, K. K. Shukla. 112-123 [doi]
- Key Identifications Using Hebbian LearningBhavya Ishaan Murmu, Anu Kumari, Manu Malkani, Sanjeet Kumar. 124-133 [doi]
- An Automated Methodology for Secured User Allocation in CloudSrijita Basu, Anirban Sengupta, Chandan Mazumdar. 137-151 [doi]
- Provenance-Aware NoSQL DatabasesAnu Mary Chacko, Munavar Fairooz, S. D. Madhu Kumar. 152-160 [doi]
- Efficient Key Management in IoT Using Mobile AggregatorSumit Saurabh, Alwyn R. Pais, Sumanta Chatterjee. 161-172 [doi]
- Cloud Resources Optimization for Air Pollution Monitoring Devices and Avoiding Post Pillar ProblemParampreet Singh, Pankaj Deep Kaur. 173-187 [doi]
- Credibility Assessment of Public Pages over FacebookHimanshi Agrawal, Rishabh Kaushal. 188-198 [doi]
- Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud EnvironmentV. Thangam, K. Chandrasekaran. 199-212 [doi]
- Secure and Privacy Preserving Mobile Healthcare Data Exchange Using Cloud ServiceDoyel Pal, Gobinda Senchury, Praveenkumar Khethavath. 213-224 [doi]
- Secure Certificateless Signature Scheme with Batch Verification from Bilinear PairingsN. B. Gayathri, P. Vasudeva Reddy. 225-235 [doi]
- Security Requirements Elicitation and Modeling AuthorizationsRajat Goel, Mahesh Chandra Govil, Girdhari Singh. 239-250 [doi]
- Two Level Signature Based Authorization Model for Secure Data WarehouseAnjana Gosain, Amar Arora. 251-257 [doi]
- Nonlinear Tracking of Target Submarine Using Extended Kalman Filter (EKF)S. Vikranth, P. Sudheesh, M. Jayakumar. 258-268 [doi]
- Tracking Inbound Enemy Missile for Interception from Target Aircraft Using Extended Kalman FilterT. S. Gokkul Nath, P. Sudheesh, M. Jayakumar. 269-279 [doi]
- A Secure One-Time Password Authentication Scheme Using Image Texture FeaturesMaitreya Maity, Dhiraj Manohar Dhane, Tushar Mungle, Rupak Chakraborty, Vasant Deokamble, Chandan Chakraborty. 283-294 [doi]
- Analyzing the Applicability of Bitsum Algorithm on LSB Steganography TechniqueBagga Amandeep, G. Geetha. 295-304 [doi]
- Extreme Learning Machine for Semi-blind Grayscale Image Watermarking in DWT DomainAnkit Rajpal, Anurag Mishra, Rajni Bala. 305-317 [doi]
- A Passive Blind Approach for Image Splicing Detection Based on DWT and LBP HistogramsMandeep Kaur, Savita Gupta. 318-327 [doi]
- An Image Forensic Technique for Detection of Copy-Move Forgery in Digital ImageAshwini Malviya, Siddharth Ladhake. 328-335 [doi]
- Secure Authentication in Online Voting System Using Multiple Image Secret SharingP. Sanyasi Naidu, Reena Kharat. 336-343 [doi]
- Touch and Track: An Anti-theft and Data Protection Technique for SmartphonesSohini Roy, Arvind Kumar Shah, Uma Bhattacharya. 347-357 [doi]
- Enhancement of Detecting Wicked Website Through Intelligent MethodsTarik A. Rashid, Salwa O. Mohamad. 358-368 [doi]
- Prediction of Malicious Domains Using Smith Waterman AlgorithmB. Ashwini, Vijay Krishna Menon, K. P. Soman. 369-376 [doi]
- Outsource-Secured Calculation of Closest Pair of PointsChandrasekhar Kuruba, Kethzi Gilbert, Prabhav Sidhaye, Gaurav Pareek, Purushothama Byrapura Rangappa. 377-389 [doi]
- Discovering Vulnerable Functions: A Code Similarity Based ApproachAditya Chandran, Lokesh Jain, Sanjay Rawat, Kannan Srinathan. 390-402 [doi]
- Performance Analysis of Spectrum Sensing Algorithm Using Multiple Antenna in Cognitive RadioKomal Pawar, Tanuja Dhope. 403-413 [doi]
- Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced PowerT. S. Gokkul Nath, E. R. Midhila, Ashwin Swaminathan, Binitaa Lekshmi, J. P. Anita. 414-426 [doi]
- Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad SplitShubha Puthran, Ketan Shah. 427-438 [doi]
- MalJs: Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble ClassifierSurendran K, Prabaharan Poornachandran, Aravind Ashok Nair, Srinath N, Ysudhir Kumar, Hrudya P. 439-449 [doi]
- SocialBot: Behavioral Analysis and DetectionMadhuri Dewangan, Rishabh Kaushal. 450-460 [doi]
- Vulnebdroid: Automated Vulnerability Score Calculator for Android ApplicationsSugandha Gupta, Rishabh Kaushal. 461-471 [doi]