Recent Trends in Computer Networks and Distributed Systems Security

Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014, Proceedings

Editors:

ISBN: 978-3-642-54524-5 (Print) 978-3-642-54525-2 (Online)

Table of contents (49 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Security and Privacy in Networked Systems

    1. No Access

      Book Chapter

      Pages 1-15

      Collaborative Approach for Data Integrity Verification in Cloud Computing

    2. No Access

      Book Chapter

      Pages 16-31

      EESOR: Energy Efficient Selective Opportunistic Routing in Wireless Sensor Networks

    3. No Access

      Book Chapter

      Pages 32-44

      A Security Framework for Multi-authority Based e-Sealed Bid Auction System

    4. No Access

      Book Chapter

      Pages 45-56

      Analysis of Semantic Attacks in Online Social Networks

    5. No Access

      Book Chapter

      Pages 57-69

      Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryption

    6. No Access

      Book Chapter

      Pages 70-78

      MM-SOAR: Modified SOAR Protocol Using Multiple Metrics for Wireless Mesh Network

    7. No Access

      Book Chapter

      Pages 79-90

      Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networks

    8. No Access

      Book Chapter

      Pages 91-102

      Virtual Machine Isolation

    9. No Access

      Book Chapter

      Pages 103-114

      Trust Based VM Consolidation in Cloud Data Centers

    10. No Access

      Book Chapter

      Pages 115-126

      A Trust Model for Directory-Based Service Discovery in Mobile Ad Hoc Networks

    11. No Access

      Book Chapter

      Pages 127-138

      Chain Routing for Convergecast Small Scale Wireless Sensor Networks

    12. No Access

      Book Chapter

      Pages 139-150

      A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment

    13. No Access

      Book Chapter

      Pages 151-159

      Autonomic SLA Management in Cloud Computing Services

  3. Multimedia Security

    1. No Access

      Book Chapter

      Pages 160-171

      A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Coding, Reduced SVD, Over Complete Dictionary and L1 Optimization

    2. No Access

      Book Chapter

      Pages 172-183

      Compressive Sensing Based Audio Scrambling Using Arnold Transform

    3. No Access

      Book Chapter

      Pages 184-191

      Cryptanalysis of Two Authentication Scheme for DRM System

    4. No Access

      Book Chapter

      Pages 192-201

      Improving Test Conformance of Smart Cards versus EMV-Specification by Using on the Fly Temporal Property Verification

    5. No Access

      Book Chapter

      Pages 202-210

      Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features

  4. Cryptosystems, Algorithms, Primitives

    1. No Access

      Book Chapter

      Pages 211-222

      A New Variant of Algebraic Attack

    2. No Access

      Book Chapter

      Pages 223-230

      A Novel Design of Chaos Based S-Box Using Difference Distribution Table (CD S-Box)

previous Page of 3