Login / Signup
SNDS
2012
2014
2012
2014
Keyphrases
Publications
2014
Nishanth Augustine
,
Sudhish N. George
,
P. P. Deepthi
Compressive Sensing Based Audio Scrambling Using Arnold Transform.
SNDS
(2014)
R. Anitha
,
Saswati Mukherjee
Metadata Attribute Based Cipher-Key Generation System in Cloud.
SNDS
(2014)
Vijay Anand Pandian
,
T. Gireesh Kumar
A Novel Cloud Based NIDPS for Smartphones.
SNDS
(2014)
Rajat Saxena
,
Somnath Dey
Collaborative Approach for Data Integrity Verification in Cloud Computing.
SNDS
(2014)
Venkatasamy Sureshkumar
,
Anitha Ramalingam
Analysis of Electronic Voting Protocol Using Strand Space Model.
SNDS
(2014)
Dheerendra Mishra
,
Sourav Mukhopadhyay
Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card.
SNDS
(2014)
G. Jyothish Lal
,
V. K. Veena
A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Coding, Reduced SVD, Over Complete Dictionary and L1 Optimization.
SNDS
(2014)
K. P. Krishna Kumar
,
G. Geethakumari
Analysis of Semantic Attacks in Online Social Networks.
SNDS
(2014)
Saed Alrabaee
,
Khaled Khateeb
,
Fawaz Ali Khasawneh
Preserving Database Privacy in Cloud Computing.
SNDS
(2014)
S. Anithakumari
,
K. Chandra Sekaran
Autonomic SLA Management in Cloud Computing Services.
SNDS
(2014)
R. Deepa
,
S. Swamynathan
A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks.
SNDS
(2014)
Monika Darji
,
Bhushan Trivedi
Emergency Aware, Non-invasive, Personalized Access Control Framework for IMDs.
SNDS
(2014)
Kanakkath Praveen
,
K. Rajeev
,
M. Sethumadhavan
On the Extensions of (k, n)*-Visual Cryptographic Schemes.
SNDS
(2014)
Marcus Hardt
,
Arsen Hayrapetyan
,
Paul Millar
,
Ahmed Shiraz Memon
Combining the X.509 and the SAML Federated Identity Management Systems.
SNDS
(2014)
Appala Naidu Tentu
,
Prabal Paul
,
V. Ch. Venkaiah
Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes.
SNDS
(2014)
Anuradha Jadiya
,
Deepak Chatrabhuj Karia
MM-SOAR: Modified SOAR Protocol Using Multiple Metrics for Wireless Mesh Network.
SNDS
(2014)
Payingat Jilna
,
P. P. Deepthi
Implementation of an Elliptic Curve Based Message Authentication Code for Constrained Environments.
SNDS
(2014)
Saumya Omanakuttan
,
Madhumita Chatterjee
Experimental Analysis on Access Control Using Trust Parameter for Social Network.
SNDS
(2014)
Sourav Sinha
,
Mamata Jenamani
A Security Framework for Multi-authority Based e-Sealed Bid Auction System.
SNDS
(2014)
Munaga V. N. K. Prasad
,
Ilaiah Kavati
,
B. Adinarayana
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features.
SNDS
(2014)
C. R. Yamuna Devi
,
Deepak Sunder
,
S. H. Manjula
,
K. R. Venugopal
,
Lalit M. Patnaik
Chain Routing for Convergecast Small Scale Wireless Sensor Networks.
SNDS
(2014)
Germain Jolly
,
Sylvain Vernois
,
Jean-Luc Lambert
Improving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property Verification.
SNDS
(2014)
Dheerendra Mishra
,
Sourav Mukhopadhyay
Cryptanalysis of Two Authentication Scheme for DRM System.
SNDS
(2014)
M. Sindhu
,
M. Sethumadhavan
On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q = p, prime).
SNDS
(2014)
Mahmoud Khasawneh
,
Izadeen Kajman
,
Rashed Alkhudaidy
,
Anwar Althubyani
A Survey on Wi-Fi Protocols: WPA and WPA2.
SNDS
(2014)
Musheer Ahmad
,
Parvez Mahmood Khan
,
Mohd. Zeeshan Ansari
A Simple and Efficient Key-Dependent S-Box Design Using Fisher-Yates Shuffle Technique.
SNDS
(2014)
P. Badharudheen
,
Anu Mary Chacko
,
S. D. Madhu Kumar
Making an Application Provenance-Aware through UML - A General Scheme.
SNDS
(2014)
Balasubramanian Chelliah
,
S. Geetha
Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme - B-PASS.
SNDS
(2014)
Dibyendu Roy
,
Pratish Datta
,
Sourav Mukhopadhyay
A New Variant of Algebraic Attack.
SNDS
(2014)
Hiran V. Nath
,
Babu M. Mehtre
Static Malware Analysis Using Machine Learning Methods.
SNDS
(2014)
Lovejit Singh
,
Sarbjeet Singh
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment.
SNDS
(2014)
Anant V. Nimkar
,
Soumya K. Ghosh
A Theoretical Study on Access Control Model in Federated Systems.
SNDS
(2014)
Adrian Pauna
,
Victor Valeriu Patriciu
CASSHH - Case Adaptive SSH Honeypot.
SNDS
(2014)
C. R. Yamuna Devi
,
B. Shivaraj
,
S. H. Manjula
,
K. R. Venugopal
,
Lalit M. Patnaik
EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor Networks.
SNDS
(2014)
Quist-Aphetsi Kester
,
Laurent Nana
,
Anca Christine Pascu
,
Sophie Gire
,
Jojo Moses Eghan
,
Nii Narku Quaynor
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement.
SNDS
(2014)
Muhammad Asif Khan
,
Varun Jeoti
A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box).
SNDS
(2014)
Mridul Sankar Barik
,
Chandan Mazumdar
A Graph Data Model for Attack Graph Generation and Analysis.
SNDS
(2014)
Balu Sridevi
,
G. V. Shirley Julia
,
S. Rajaram
Seamless Handoff of Ping-Pong Calls in Mobile Wimax Networks.
SNDS
(2014)
Bhavna Saini
,
Gaurav Somani
Index Page Based EDoS Attacks in Infrastructure Cloud.
SNDS
(2014)
Deepak Chatrabhuj Karia
,
Shravanee Shinde
Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networks.
SNDS
(2014)
Jayalakshmi G. Naragund
,
R. M. Banakar
Warfare Message Communication in Tactical WMN Using HWMP.
SNDS
(2014)
R. Reno Robert
Differential Execution Analysis for Obfuscation Reduction.
SNDS
(2014)
Sangeetha Dhamodaran
,
Vaidehi Vijayakumar
,
Valliammai Thirunavukkarasu
,
Aiswarya Ramesh
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption.
SNDS
(2014)
T. R. Venugopal Anandharajan
,
Marcharla Anjaneyulu Bhagyaveni
Trust Based VM Consolidation in Cloud Data Centers.
SNDS
(2014)
Shree Garg
,
Anil Kumar Sarje
,
Sateesh Kumar Peddoju
Improved Detection of P2P Botnets through Network Behavior Analysis.
SNDS
(2014)
Ratinder Kaur
,
Maninder Singh
Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks.
SNDS
(2014)
Nilesh Chakraborty
,
Samrat Mondal
SLASS: Secure Login against Shoulder Surfing.
SNDS
(2014)
R. Jithin
,
Priya Chandran
Virtual Machine Isolation - A Survey on the Security of Virtual Machines.
SNDS
(2014)
Dinesh Nepolean
,
I. Karthik
,
Mu. Preethi
,
Rahul Goyal
,
M. Kathirvel Vanethi
Privacy Preserving Ranked Keyword Search over Encrypted Cloud Data.
SNDS
(2014)
volume 420, 2014
Recent Trends in Computer Networks and Distributed Systems Security - Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings
SNDS
420 (2014)