Security in Computing and Communications

4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings

  • Mueller Peter 
  • Thampi Sabu M. 
  • Alam Bhuiyan Md Zakirul 
  • Ko Ryan 
  • Doss Robin 
  • Alcaraz Calero Jose M. 
Conference proceedings SSCC 2016

DOI: 10.1007/978-981-10-2738-3

Part of the Communications in Computer and Information Science book series (CCIS, volume 625)

Table of contents (40 papers)

  1. Front Matter
    Pages I-XXII
  2. Cryptosystems, Algorithms, Primitives

    1. Front Matter
      Pages 1-1
    2. Mark A. Will, Ryan K. L. Ko
      Pages 3-17
    3. Asha Liza John, Sabu M. Thampi
      Pages 18-29
    4. Anurag Singh Tomar, Shashi Kant Shankar, Manmohan Sharma, Aditya Bakshi
      Pages 63-73
    5. Prakash Dey, Raghvendra Singh Rohit, Santanu Sarkar, Avishek Adhikari
      Pages 74-86
    6. Kulvaibhav Kaushik, Vijayaraghavan Varadharajan
      Pages 99-111
    7. Prakhar Jain, K. K. Shukla
      Pages 112-123
    8. Bhavya Ishaan Murmu, Anu Kumari, Manu Malkani, Sanjeet Kumar
      Pages 124-133
  3. Security and Privacy in Networked Systems

    1. Front Matter
      Pages 135-135
    2. Srijita Basu, Anirban Sengupta, Chandan Mazumdar
      Pages 137-151
    3. Anu Mary Chacko, Munavar Fairooz, S. D. Madhu Kumar
      Pages 152-160
    4. Sumit Saurabh, Alwyn R. Pais, Sumanta Chatterjee
      Pages 161-172
    5. Himanshi Agrawal, Rishabh Kaushal
      Pages 188-198

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. 
The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security. 

Keywords

System and Network Security Visual Cryptography Image Forensics Applications Security Cryptosystems

Editors and affiliations

  • Mueller Peter 
    • 1
  • Thampi Sabu M. 
    • 2
  • Alam Bhuiyan Md Zakirul 
    • 3
  • Ko Ryan 
    • 4
  • Doss Robin 
    • 5
  • Alcaraz Calero Jose M. 
    • 6
  1. 1.IBM ZURICH RESEARCH LABORATORY IBM ZURICH RESEARCH LABORATORYRUESCHLIKONSwitzerland
  2. 2.Technology and ManagementIndian Institute of Information Technology and ManagementKeralaIndia
  3. 3.Temple UniversityNew YorkUSA
  4. 4.Computer ScienceUniversity of Waikato Computer ScienceHamiltonNew Zealand
  5. 5.Deakin University BurwoodAustralia
  6. 6.University of the West of Scotland Paisley, GlasgowUnited Kingdom

Bibliographic information

  • Copyright Information Springer Nature Singapore Pte Ltd. 2016
  • Publisher Name Springer, Singapore
  • eBook Packages Computer Science
  • Print ISBN 978-981-10-2737-6
  • Online ISBN 978-981-10-2738-3
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937