© 2015

Security in Computing and Communications

Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

  • Jemal H. Abawajy
  • Sougata Mukherjea
  • Sabu M. Thampi
  • Antonio Ruiz-Martínez
Conference proceedings SSCC 2015

Part of the Communications in Computer and Information Science book series (CCIS, volume 536)

Table of contents

  1. Front Matter
    Pages I-XXI
  2. Security in Cloud Computing

    1. Front Matter
      Pages 1-1
    2. Dapeng Xiong, Peng Zou, Jun Cai, Jun He
      Pages 3-12
    3. Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen
      Pages 13-23
    4. Deepnarayan Tiwari, G. R. Gangadharan
      Pages 24-35
    5. Naveen Kumar, Anish Mathuria, Manik Lal Das
      Pages 36-44
    6. Muthukumar B., Praveen Kumar Rajendran
      Pages 54-65
    7. Ronak Vyas, Alok Singh, Jolly Singh, Gunjan Soni, B. R. Purushothama
      Pages 66-77
    8. Sandeep Kakde, Mithilesh Mahindra, Atish Khobragade, Nikit Shah
      Pages 78-85
  3. Authentication and Access Control Systems

    1. Front Matter
      Pages 87-87
    2. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor
      Pages 89-98
    3. Sarat kr. Chettri, B. Borah
      Pages 99-109
    4. Byrapura Rangappa Purushothama, B. B. Amberker
      Pages 122-133
    5. Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen
      Pages 146-156
    6. A. Athira Ram, T. S. Jyothis
      Pages 157-167
    7. Nazneen Akhter, Hanumant Gite, Gulam Rabbani, Karbhari Kale
      Pages 168-175
    8. Chandra Mouliswaran Subramanian, Aswani Kumar Cherukuri, Chandrasekar Chelliah
      Pages 176-185

About these proceedings


This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.


access control anomaly detection attacks authentication biometrics cloud computing computer networks cryptography forensics mobile ad hoc networks network security security and privacy security protocols security services steganography system and network security wireless sensor networks

Editors and affiliations

  • Jemal H. Abawajy
    • 1
  • Sougata Mukherjea
    • 2
  • Sabu M. Thampi
    • 3
  • Antonio Ruiz-Martínez
    • 4
  1. 1.Deakin UniversityGeelongAustralia
  2. 2.IBM Research-IndiaNew DelhiIndia
  3. 3.Indian Institute of Information Technology and ManagementKeralaIndia
  4. 4.University of MurciaEspinardoSpain

Bibliographic information

  • Book Title Security in Computing and Communications
  • Book Subtitle Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings
  • Editors Jemal H. Abawajy
    Sougata Mukherjea
    Sabu M. Thampi
    Antonio Ruiz-Martínez
  • Series Title Communications in Computer and Information Science
  • Series Abbreviated Title Communic.Comp.Inf.Science
  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Softcover ISBN 978-3-319-22914-0
  • eBook ISBN 978-3-319-22915-7
  • Series ISSN 1865-0929
  • Series E-ISSN 1865-0937
  • Edition Number 1
  • Number of Pages XXI, 548
  • Number of Illustrations 239 b/w illustrations, 0 illustrations in colour
  • Topics Systems and Data Security
    Computer Communication Networks
  • Buy this book on publisher's site