default search action
10th SIN 2017: Jaipur, IN, India
- Rajveer Singh Shekhawat, Manoj Singh Gaur, Atilla Elçi, Jaideep Vaidya, Oleg B. Makarevich, Ron Poet, Mehmet A. Orgun, Vijaypal S. Dhaka, Manoj Kumar Bohra, Virender Singh, Ludmila K. Babenko, Naghmeh Moradpoor Sheykhkanloo, Behnam Rahnama:
Proceedings of the 10th International Conference on Security of Information and Networks, SIN 2017, Jaipur, IN, India, October 13-15, 2017. ACM 2017
Cloud data security, access control and management
- Muhammad I. H. Sukmana, Kennedy A. Torkura, Christoph Meinel, Hendrik Graupner:
Redesign cloudRAID for flexible and secure enterprise file sharing over public cloud storage. 3-10 - Nazatul Haque Sultan, Ferdous Ahmed Barbhuiya, Nityananda Sarma:
A universal cloud user revocation scheme with key-escrow resistance for ciphertext-policy attribute-based access control. 11-18 - Jay Dave, Parvez Faruki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
Secure and efficient proof of ownership for deduplicated cloud storage. 19-26
Hash functions, cryptography and cryptanalytic attacks
- Evgeniya Ishchukova, Ekaterina Tolomanenko, Ludmila K. Babenko:
Differential ananlysis of 3 round Kuznyechik. 29-36 - Rahul Saxena, Monika Jain, Dushyant Singh, Ashutosh Kushwah:
An enhanced parallel version of RSA public key crypto based algorithm using openMP. 37-42
Security applications using cryptography
- Liudmila Babenko, Ilya Pisarev, Oleg B. Makarevich:
A model of a secure electronic voting system based on blind intermediaries using russian cryptographic algorithms. 45-50 - Durbadal Chattaraj, Monalisa Sarma, Debasis Samanta:
Privacy preserving two-server Diffie-Hellman key exchange protocol. 51-58 - Shailja Dahiya, Manoj Kumar Bohra:
Element-key table based complex key generation (E-CKG) for IoT based health care networks. 59-64
Security architecture and protocols
- Fedor Novikov, Ludmila N. Fedorchenko, Vladimir I. Vorobiev, Roza R. Fatkieva, Dmitriy K. Levonevskiy:
Attribute-based approach of defining the secure behavior of automata objects. 67-72 - Maxim O. Kalinin, Vasiliy M. Krundyshev, Peter D. Zegzhda, Viacheslav Belenko:
Network security architectures for VANET. 73-79 - Rajesh Kumar Shrivastava, Sanket Mishra, Srimanta Barua, Chittaranjan Hota:
Resilient complex event processing in IoT using side-channel information. 80-87
Machine learning and attack detection
- Ankit Bansal, Sudipta Mahapatra:
A comparative analysis of machine learning techniques for botnet detection. 91-98
Threat, anomaly and malware detection
- Roman Demidov, Alexander I. Pechenkin, Peter D. Zegzhda:
Integer overflow vulnerabilities detection in software binary code. 101-106 - Kamalakanta Sethi, Shankar Kumar Chaudhary, Bata Krishna Tripathy, Padmalochan Bera:
A novel malware analysis for malware detection and classification using machine learning algorithms. 107-113
Image classification, security and steganography
- Narayan Vetrekar, Kiran B. Raja, Ramachandra Raghavendra, Rajendra S. Gad, Christoph Busch:
Collaborative representation of Grassmann manifold projection metric for robust multi-spectral face recognition. 117-124 - Narayan Vetrekar, Ramachandra Raghavendra, Kiran B. Raja, Rajendra S. Gad, Christoph Busch:
Extended multi-spectral imaging for gender classification based on image set. 125-130
Data and system analysis, access permission, and secret sharing
- Alexander S. Basan, Elena Basan, Oleg B. Makarevich:
Analysis of ways to secure group control for autonomous mobile robots. 134-139 - Konstantin E. Rumyantsev, Evgeny Rudinsky:
Parameters of the two-stage synchronization algorithm for the quantum key distribution system. 140-147
Attacks and defences
- Jimmy Bondu, Anupal Mishra, Vijay Laxmi, Manoj Singh Gaur:
Flooding in secure wireless sensor networks: Student contribution. 151-156 - Rachana Yogesh Patil, Satish R. Devane:
Unmasking of source identity, a step beyond in cyber forensic. 157-164 - Raksha Nawal, Rajbir Kaur:
Abnormal leakage of energy in battery-based IoT-devices. 165-170 - Pynbianglut Hadem, Dilip Kumar Saikia:
SMITE: an SDN and MPLS integrated traceback mechanism. 171-177 - Nivindar Kaur, Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava:
Performance impact of topology poisoning attack in SDN and its countermeasure. 179-184
Short papers
- Upasana T. Nagar, Priyadarsi Nanda, Xiangjian He, Zhiyuan Thomas Tan:
A framework for data security in cloud using collaborative intrusion detection scheme. 188-193 - Kamalakanta Sethi, Anish Chopra, Padmalochan Bera, Bata Krishna Tripathy:
Integration of role based access control with homomorphic cryptosystem for secure and controlled access of data in cloud. 194-199 - Valeriy O. Osipyan, Valeriy S. Tlusten, Nina V. Laktionova, Nadezhda V. Vakhrusheva:
The duality principle in the theory of development generalized A-M knapsack cryptosystems. 200-205 - Mahaveer Prasad Soni, Alwyn R. Pais:
Light-weight hash algorithms using GRP instruction. 206-211 - Gaurav Pareek, B. R. Purushothama:
Proxy visible re-encryption scheme with application to e-mail forwarding. 212-217 - Swati Gaur, Sudhanshu Gaur:
Component-centric application-driven framework: towards taming privilege separation in Android. 218-223 - Ronak Odhaviya, Anamika Modi, Rahi Sheth, Anish Mathuria:
Feasibility of idle port scanning using RST rate-limit. 224-228 - Anubha Parashar, Apoorva Parashar, Somya Goyal:
Identification of gait data using machine learning technique to categories human locomotion. 229-234 - Jani Tammi, Sampsa Rauti, Ville Leppänen:
Practical challenges in building fake services with the record and play approach. 235-239 - Ludmila K. Babenko, Alexey Kirillov:
Malware detection by meta-information of used system functions. 240-244 - Sampsa Rauti, Ville Leppänen:
Internal interface diversification with multiple fake interfaces. 245-250 - Harsurinder Kaur, Husanbir Singh Pannu:
Anomaly detection survey for information security. 251-258 - Vivek P. Khalane, Umesh Bhadade:
Image encryption using wavelet transform over finite field. 257-261 - Antonina Komarova, Alexander Menshchikov, Tatyana Klyaus, Anatoly Korobeynikov, Yurij A. Gatchin, Nina Tishukova:
Analysis and comparison of electronic digital signature state standards GOST R 34.10-1994, GOST R 34.10-2001 and GOST R 34.10-2012. 262-267 - Jaina P. Bhoiwala, Rutvij H. Jhaveri:
Cooperation based defense mechanism against selfish nodes in DTNs. 268-273 - Naghmeh Moradpoor, Martyn Brown, Gordon Russell:
Insider threat detection using principal component analysis and self-organising map. 274-279 - Peter D. Zegzhda, Dmitry P. Zegzhda, Evgeny Pavlenko, Andrew Dremov:
Detecting Android application malicious behaviors based on the analysis of control flows and data flows. 280-283
Extended abstracts
- Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev:
Two simplified versions of Kuznyechik cipher (GOST R 34.12-2015). 287-290 - Sunil Dutt, Bikram Paul, Anshu Chauhan, Sukumar Nandi, Gaurav Trivedi:
Approxhash: delay, power and area optimized approximate hash functions for cryptography applications. 291-294 - Dmitry P. Zegzhda, Peter D. Zegzhda, Alexander I. Pechenkin, Maria A. Poltavtseva:
Modeling of information systems to their security evaluation. 295-298 - Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava:
Evaluating machine learning algorithms for detection of interest flooding attack in named data networking. 299-302 - Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur:
'Global view' in SDN: existing implementation, vulnerabilities & threats. 303-306 - Abdulaziz Almehmadi, Zeinab Joudaki, Roozbeh Jalali:
Language usage on Twitter predicts crime rates. 307-310 - Ankur Shukla, Divya Vikash, Bharavi Mishra, Poonam Gera:
Permission recommender system for Android. 311-314 - Vishnu Prasad C, Arun Raj Kumar P:
Secret sharing scheme based on Cauchy matrix for data outsourcing. 315-318 - Srikanta Pradhan, Somanath Tripathy:
CAP: collaborative attack on pastry. 319-322
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.