Abstract is missing.
- A Dynamic Multi-domain Access Control Model in Cloud ComputingDapeng Xiong, Peng Zou, Jun Cai, Jun He. 3-12 [doi]
- Multilevel Threshold Secret Sharing in Distributed CloudDoyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen. 13-23 [doi]
- Secure Sharing of Data in Cloud ComputingDeepnarayan Tiwari, G. R. Gangadharan. 24-35 [doi]
- Comparing the Efficiency of Key Management Hierarchies for Access Control in CloudNaveen Kumar 0011, Anish Mathuria, Manik Lal Das. 36-44 [doi]
- Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud ComputingN. M. Dhanya, G. Kousalya. 45-53 [doi]
- Intelligent Intrusion Detection System for Private Cloud EnvironmentMuthukumar B., Praveen Kumar Rajendran. 54-65 [doi]
- Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud ComputingRonak Vyas, Alok Singh, Jolly Singh, Gunjan Soni, B. R. Purushothama. 66-77 [doi]
- FPGA Implementation of 128-Bit Fused Multiply Add Unit for Crypto ProcessorsSandeep Kakde, Mithilesh Mahindra, Atish Khobragade, Nikit Shah. 78-85 [doi]
- A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital ImagesQuist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor. 89-98 [doi]
- Anonymizing Classification Data for Preserving PrivacySarat kr. Chettri, B. Borah. 99-109 [doi]
- An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANETVimal Kumar, Rakesh Kumar. 110-121 [doi]
- Polynomial Construction and Non-tree Based Efficient Secure Group Key Management SchemeByrapura Rangappa Purushothama, B. B. Amberker. 122-133 [doi]
- Cryptanalysis and Improvement of ECC - Based Security Enhanced User Authentication Protocol for Wireless Sensor NetworksAnup Kumar Maurya, V. N. Sastry, Siba Kumar Udgata. 134-145 [doi]
- Secure and Privacy Preserving Biometric Authentication Using Watermarking TechniqueDoyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen. 146-156 [doi]
- Reducing Vulnerability of a Fingerprint Authentication SystemA. Athira Ram, T. S. Jyothis. 157-167 [doi]
- Heart Rate Variability for Biometric Authentication Using Time-Domain FeaturesNazneen Akhter, Hanumant Gite, Gulam Rabbani, Karbhari Kale. 168-175 [doi]
- Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept AnalysisChandra Mouliswaran Subramanian, Aswani Kumar Cherukuri, Chandrasekar Chelliah. 176-185 [doi]
- An Efficient Fingerprint Minutiae Detection AlgorithmY. Prashanth Reddy, Kamlesh Tiwari, Vandana Dixit Kaushik, Phalguni Gupta. 186-194 [doi]
- An Improved Substitution Method for Data Encryption Using DNA Sequence and CDMBRavi Gupta, Rahul Kumar Singh. 197-206 [doi]
- Analysis of Neural Synchronization Using Genetic Approach for Secure Key GenerationS. Santhanalakshmi, Sangeeta K., Gopal K. Patra. 207-216 [doi]
- CLCT: Cross Language Cipher TechniqueLaukendra Singh, Rahul Johari. 217-227 [doi]
- A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital ImagesQuist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo Moses Eghan, Nii Narku Quaynor. 228-237 [doi]
- A Coupled Chaos Based Image Encryption Scheme Using Bit Level DiffusionP. Devaraj, C. Kavitha. 238-246 [doi]
- Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an ImageM. Sundari, P. B. Revathi, S. Sumesh. 247-255 [doi]
- A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric KeyM. Suchithra, O. K. Sikha. 256-264 [doi]
- Dual Stage Text Steganography Using Unicode HomoglyphsSachin Hosmani, H. G. Rama Bhat, K. Chandrasekaran. 265-276 [doi]
- Securing Database Server Using Homomorphic Encryption and Re-encryptionSarath Greeshma, R. Jayapriya. 277-289 [doi]
- A Robust and Secure DWT-SVD Digital Image Watermarking Using Encrypted Watermark for Copyright Protection of Cheque ImageSudhanshu Suhas Gonge, Ashok Ghatol. 290-303 [doi]
- Occlusion Detection Based on Fractal Texture Analysis in Surveillance Videos Using Tree-Based ClassifiersJ. Arunnehru, M. Kalaiselvi Geetha, T. Nanthini. 307-316 [doi]
- A Modus Operandi for Social Networking Security Solutions Based on Varied UsagesR. Kamatchi, Kanika Minocha. 317-328 [doi]
- A Secret Common Information Duality for Tripartite Noisy CorrelationsPradeep Kr. Banerjee. 329-341 [doi]
- Exploiting Domination in Attack Graph for Enterprise Network HardeningGhanshyam S. Bopche, Babu M. Mehtre. 342-353 [doi]
- Modeling Dependencies of ISO/IEC 27002: 2013 Security ControlsAnirban Sengupta. 354-367 [doi]
- Secure Cluster Based Routing Scheme (SCBRS) for Wireless Sensor NetworksSohini Roy. 368-380 [doi]
- A Pareto Survivor Function Based Cluster Head Selection Mechanism (PSFCHSM) to Mitigate Selfish Nodes in Wireless Sensor NetworksPL. Rajarajeswari, N. K. Karthikeyan. 381-391 [doi]
- Vehicle Brake and Indicator Detection for Autonomous VehiclesR. Sathya, M. Kalaiselvi Geetha, P. Aboorvapriya. 392-401 [doi]
- Secure Multipoint Relay Node Selection in Mobile Ad Hoc NetworksJeril Kuriakose, V. Amruth, R. Vikram Raju. 402-411 [doi]
- Human Activity Recognition Based on Motion Projection Profile Features in Surveillance Videos Using Support Vector Machines and Gaussian Mixture ModelsJ. Arunnehru, M. Kalaiselvi Geetha. 412-423 [doi]
- Analysis of Accountability Property in Payment Systems Using Strand Space ModelVenkatasamy Sureshkumar, Anitha Ramalingam, S. Anandhi. 424-437 [doi]
- Technical Aspects of Cyber Kill ChainTarun Yadav, Arvind Mallari Rao. 438-452 [doi]
- Detection and Mitigation of Android Malware Through Hybrid ApproachKanubhai Patel, Bharat Buddadev. 455-463 [doi]
- Malicious Circuit Detection for Improved Hardware SecurityR. Bharath, G. Arun Sabari, Dhinesh Ravi Krishna, Arun Prasathe, K. Harish, N. Mohankumar, M. Nirmala Devi. 464-472 [doi]
- Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts from RAM ImageRohit Sharma, Upasna Singh. 473-482 [doi]
- Anomaly Detection Through Comparison of Heterogeneous Machine Learning Classifiers vs KPCAGoverdhan Reddy Jidiga, Porika Sammulal. 483-495 [doi]
- Android Users Security via Permission Based AnalysisPradeep Kumar Tiwari, Upasna Singh. 496-505 [doi]
- Data-Centric Refinement of Information Flow Analysis of Database ApplicationsMd. Imran Alam, Raju Halder. 506-518 [doi]
- Detection and Diagnosis of Hardware Trojan Using Power AnalysisEknadh Vaddi, Karthik Gaddam, Rahul Karthik Maniam, Sai Abhishek Mallavajjala, Srinivasulu Dasari, M. Nirmala Devi. 519-529 [doi]
- A Low Overhead Prevention of Android WebView Abuse AttacksJamsheed K., Praveen K.. 530-537 [doi]
- An Automata Based Approach for the Prevention of NoSQL InjectionsSwathy Joseph, K. P. Jevitha. 538-546 [doi]