Online Library TheLib.net » Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings
cover of the book Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings

Ebook: Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings

00
27.01.2024
0
0

This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.




This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.


This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.
Content:
Front Matter....Pages -
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials....Pages 1-10
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation....Pages 11-22
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection....Pages 23-34
ID-Based Threshold Signcryption and Group Unsigncryption....Pages 35-44
Protocol for Secure Submissions into Learning Management Systems....Pages 45-53
Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET....Pages 54-63
WAKE: Authentication and Key Establishment for Wireless Mesh Network....Pages 64-74
Effective Implementation of DES Algorithm for Voice Scrambling....Pages 75-84
Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking....Pages 85-96
Security Analysis of CAPTCHA....Pages 97-109
Imperceptible Image Indexing Using Digital Watermarking....Pages 110-116
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbers....Pages 117-126
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC....Pages 127-134
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree....Pages 135-146
An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks....Pages 147-156
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool....Pages 157-167
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions....Pages 168-177
Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases....Pages 178-184
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks....Pages 185-194
Taxonomy of Slow DoS Attacks to Web Applications....Pages 195-204
Crypto-Precision: Testing Tool for Hash Function....Pages 205-214
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES....Pages 215-224
Towards Retrieving Live Forensic Artifacts in Offline Forensics....Pages 225-233
Carving of Bitmap Files from Digital Evidences by Contiguous File Filtering....Pages 234-239
Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks....Pages 240-251
Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy....Pages 252-263
Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems....Pages 264-271
Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups....Pages 272-282
A Virtualization-Level Future Internet Defense-in-Depth Architecture....Pages 283-292
Experimental DRM Model Using Mobile Code and White-Box Encryption....Pages 293-303
Towards a Secure, Transparent and Privacy-Preserving DRM System....Pages 304-313
Time Based Constrained Object Identification in a Dynamic Social Network....Pages 314-322
A New Approach towards Segmentation for Breaking CAPTCHA....Pages 323-335
A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics....Pages 336-346
Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology....Pages 347-357
eCloudIDS – Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment....Pages 358-371
A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network....Pages 372-384
Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering Installations....Pages 385-395
A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks....Pages 396-407
iReSign – Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture Using Hybrid Region-Based Shape Representation Techniques....Pages 408-421
Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation....Pages 422-431
eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment....Pages 432-443
Implementation of MD6....Pages 444-455
Location Estimation of Mobile in GSM and CDMA Networks....Pages 456-465
An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework....Pages 466-473
Biologically Inspired Computer Security System: The Way Ahead....Pages 474-484
A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET....Pages 485-496
Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis....Pages 497-506
Back Matter....Pages -


This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.
Content:
Front Matter....Pages -
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials....Pages 1-10
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation....Pages 11-22
Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection....Pages 23-34
ID-Based Threshold Signcryption and Group Unsigncryption....Pages 35-44
Protocol for Secure Submissions into Learning Management Systems....Pages 45-53
Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET....Pages 54-63
WAKE: Authentication and Key Establishment for Wireless Mesh Network....Pages 64-74
Effective Implementation of DES Algorithm for Voice Scrambling....Pages 75-84
Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking....Pages 85-96
Security Analysis of CAPTCHA....Pages 97-109
Imperceptible Image Indexing Using Digital Watermarking....Pages 110-116
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbers....Pages 117-126
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC....Pages 127-134
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree....Pages 135-146
An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks....Pages 147-156
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool....Pages 157-167
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions....Pages 168-177
Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases....Pages 178-184
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks....Pages 185-194
Taxonomy of Slow DoS Attacks to Web Applications....Pages 195-204
Crypto-Precision: Testing Tool for Hash Function....Pages 205-214
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES....Pages 215-224
Towards Retrieving Live Forensic Artifacts in Offline Forensics....Pages 225-233
Carving of Bitmap Files from Digital Evidences by Contiguous File Filtering....Pages 234-239
Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks....Pages 240-251
Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy....Pages 252-263
Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems....Pages 264-271
Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups....Pages 272-282
A Virtualization-Level Future Internet Defense-in-Depth Architecture....Pages 283-292
Experimental DRM Model Using Mobile Code and White-Box Encryption....Pages 293-303
Towards a Secure, Transparent and Privacy-Preserving DRM System....Pages 304-313
Time Based Constrained Object Identification in a Dynamic Social Network....Pages 314-322
A New Approach towards Segmentation for Breaking CAPTCHA....Pages 323-335
A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics....Pages 336-346
Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology....Pages 347-357
eCloudIDS – Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment....Pages 358-371
A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network....Pages 372-384
Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering Installations....Pages 385-395
A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks....Pages 396-407
iReSign – Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture Using Hybrid Region-Based Shape Representation Techniques....Pages 408-421
Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation....Pages 422-431
eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment....Pages 432-443
Implementation of MD6....Pages 444-455
Location Estimation of Mobile in GSM and CDMA Networks....Pages 456-465
An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework....Pages 466-473
Biologically Inspired Computer Security System: The Way Ahead....Pages 474-484
A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET....Pages 485-496
Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis....Pages 497-506
Back Matter....Pages -
....
Download the book Recent Trends in Computer Networks and Distributed Systems Security: International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen