[BOOK][B] Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014 …
… , during March 13–14, 2014. SNDS-2014 brought together students, researchers, and
practitioners from both academia and industry to present their research results and development …
practitioners from both academia and industry to present their research results and development …
Recent trends in computer networks and distributed systems security
… , during March 13–14, 2014. SNDS-2014 brought together students, researchers, and
practitioners from both academia and industry to present their research results and development …
practitioners from both academia and industry to present their research results and development …
Static malware analysis using machine learning methods
HV Nath, BM Mehtre - … , SNDS 2014, Trivandrum, India, March 13-14, 2014 …, 2014 - Springer
Malware analysis forms a critical component of cyber defense mechanism. In the last decade,
lot of research has been done, using machine learning methods on both static as well as …
lot of research has been done, using machine learning methods on both static as well as …
EESOR: Energy efficient selective opportunistic routing in wireless sensor networks
CRY Devi, B Shivaraj, SH Manjula… - … SNDS 2014, Trivandrum …, 2014 - Springer
Opportunistic Routing in wireless sensor networks is a multi-hop routing. In this routing
neighbors of a node overhear the transmission and form multiple hops from source to the …
neighbors of a node overhear the transmission and form multiple hops from source to the …
A simple and efficient key-dependent S-box design using fisher-yates shuffle technique
The substitution boxes are the only components in most of symmetric encryption systems
that induce nonlinearity to provide efficacious data confusion. The cryptographic potency of …
that induce nonlinearity to provide efficacious data confusion. The cryptographic potency of …
Improved detection of P2P botnets through network behavior analysis
S Garg, AK Sarje, SK Peddoju - … , SNDS 2014, Trivandrum, India, March 13 …, 2014 - Springer
Botnets are becoming powerful threats on the Internet because they launch targeted attacks
towards organizations and the individuals. P2P botnets are resilient and more difficult to …
towards organizations and the individuals. P2P botnets are resilient and more difficult to …
On the Extensions of (k, n)*-Visual Cryptographic Schemes
A deterministic (k, n)*-Visual cryptographic scheme (VCS) was proposed by Arumugam et.al
[1] in 2012. Probabilistic schemes are used in visual cryptography to reduce the pixel …
[1] in 2012. Probabilistic schemes are used in visual cryptography to reduce the pixel …
A genetic algorithm for scheduling workflow applications in unreliable cloud environment
L Singh, S Singh - … , SNDS 2014, Trivandrum, India, March 13-14, 2014 …, 2014 - Springer
Cloud Computing refers to application and services offered over Internet using pay-as-you-go
model. The services are offered from data centers all over the world, which jointly are …
model. The services are offered from data centers all over the world, which jointly are …
Cloud audit: A data integrity verification approach for cloud computing
Cloud computing is the fastest growing and promising field in the sector of service provision.
It is a very trendy situation for security implementation in the Cloud. Thus, security …
It is a very trendy situation for security implementation in the Cloud. Thus, security …
Computationally perfect secret sharing scheme based on error-correcting codes
AN Tentu, P Paul, VC Venkaiah - … , SNDS 2014, Trivandrum, India, March …, 2014 - Springer
In this paper, we propose a secret sharing scheme for compartmented access structure with
lower bounds. Construction of the scheme is based on the Maximum Distance Separable (…
lower bounds. Construction of the scheme is based on the Maximum Distance Separable (…