Security in Computing and Communications

4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings

ISBN: 978-981-10-2737-6 (Print) 978-981-10-2738-3 (Online)

Table of contents (40 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XXII

  2. Cryptosystems, Algorithms, Primitives

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-17

      Computing Mod with a Variable Lookup Table

    3. No Access

      Chapter

      Pages 18-29

      Mutual Authentication Based on HECC for RFID Implant Systems

    4. No Access

      Chapter

      Pages 30-41

      On the Use of Asynchronous Cellular Automata in Symmetric-Key Cryptography

    5. No Access

      Chapter

      Pages 42-51

      A Random Key Generation Scheme Using Primitive Polynomials over GF(2)

    6. No Access

      Chapter

      Pages 52-62

      Multi-factor Authentication Using Recursive XOR-Based Visual Cryptography in Online Voting System

    7. No Access

      Chapter

      Pages 63-73

      Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud

    8. No Access

      Chapter

      Pages 74-86

      Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers

    9. No Access

      Chapter

      Pages 87-98

      A Comparison of Diffusion Properties of Salsa, ChaCha, and MCC Core

    10. No Access

      Chapter

      Pages 99-111

      A Secure Keyword Ordered Multiuser Searchable Encryption Framework

    11. No Access

      Chapter

      Pages 112-123

      Cryptographic Assessment of SSL/TLS Servers Popular in India

    12. No Access

      Chapter

      Pages 124-133

      Key Identifications Using Hebbian Learning

  3. Security and Privacy in Networked Systems

    1. Front Matter

      Pages 135-135

    2. No Access

      Chapter

      Pages 137-151

      An Automated Methodology for Secured User Allocation in Cloud

    3. No Access

      Chapter

      Pages 152-160

      Provenance-Aware NoSQL Databases

    4. No Access

      Chapter

      Pages 161-172

      Efficient Key Management in IoT Using Mobile Aggregator

    5. No Access

      Chapter

      Pages 173-187

      Cloud Resources Optimization for Air Pollution Monitoring Devices and Avoiding Post Pillar Problem

    6. No Access

      Chapter

      Pages 188-198

      Credibility Assessment of Public Pages over Facebook

    7. No Access

      Chapter

      Pages 199-212

      Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment

    8. No Access

      Chapter

      Pages 213-224

      Secure and Privacy Preserving Mobile Healthcare Data Exchange Using Cloud Service

    9. No Access

      Chapter

      Pages 225-235

      Secure Certificateless Signature Scheme with Batch Verification from Bilinear Pairings

  4. System and Network Security

    1. Front Matter

      Pages 237-237

    2. No Access

      Chapter

      Pages 239-250

      Security Requirements Elicitation and Modeling Authorizations

previous Page of 2