[BOOK][B] Recent Trends in Computer Networks and Distributed Systems Security: Second International Conference, SNDS 2014, Trivandrum, India, March 13-14, 2014 …

GM Pérez, SM Thampi, R Ko, L Shu - 2014 - books.google.com
… , during March 13–14, 2014. SNDS-2014 brought together students, researchers, and
practitioners from both academia and industry to present their research results and development …

Recent trends in computer networks and distributed systems security

GM Pérez, SM Thampi, R Ko, L Shu - … Systems, Trivandrum, India, 2014 - Springer
… , during March 13–14, 2014. SNDS-2014 brought together students, researchers, and
practitioners from both academia and industry to present their research results and development …

Static malware analysis using machine learning methods

HV Nath, BM Mehtre - … , SNDS 2014, Trivandrum, India, March 13-14, 2014 …, 2014 - Springer
Malware analysis forms a critical component of cyber defense mechanism. In the last decade,
lot of research has been done, using machine learning methods on both static as well as …

EESOR: Energy efficient selective opportunistic routing in wireless sensor networks

CRY Devi, B Shivaraj, SH Manjula… - … SNDS 2014, Trivandrum …, 2014 - Springer
Opportunistic Routing in wireless sensor networks is a multi-hop routing. In this routing
neighbors of a node overhear the transmission and form multiple hops from source to the …

A simple and efficient key-dependent S-box design using fisher-yates shuffle technique

M Ahmad, PM Khan, MZ Ansari - … , SNDS 2014, Trivandrum, India, March …, 2014 - Springer
The substitution boxes are the only components in most of symmetric encryption systems
that induce nonlinearity to provide efficacious data confusion. The cryptographic potency of …

Improved detection of P2P botnets through network behavior analysis

S Garg, AK Sarje, SK Peddoju - … , SNDS 2014, Trivandrum, India, March 13 …, 2014 - Springer
Botnets are becoming powerful threats on the Internet because they launch targeted attacks
towards organizations and the individuals. P2P botnets are resilient and more difficult to …

On the Extensions of (k, n)*-Visual Cryptographic Schemes

K Praveen, K Rajeev, M Sethumadhavan - … SNDS 2014, Trivandrum, India …, 2014 - Springer
A deterministic (k, n)*-Visual cryptographic scheme (VCS) was proposed by Arumugam et.al
[1] in 2012. Probabilistic schemes are used in visual cryptography to reduce the pixel …

A genetic algorithm for scheduling workflow applications in unreliable cloud environment

L Singh, S Singh - … , SNDS 2014, Trivandrum, India, March 13-14, 2014 …, 2014 - Springer
Cloud Computing refers to application and services offered over Internet using pay-as-you-go
model. The services are offered from data centers all over the world, which jointly are …

Cloud audit: A data integrity verification approach for cloud computing

R Saxena, S Dey - Procedia Computer Science, 2016 - Elsevier
Cloud computing is the fastest growing and promising field in the sector of service provision.
It is a very trendy situation for security implementation in the Cloud. Thus, security …

Computationally perfect secret sharing scheme based on error-correcting codes

AN Tentu, P Paul, VC Venkaiah - … , SNDS 2014, Trivandrum, India, March …, 2014 - Springer
In this paper, we propose a secret sharing scheme for compartmented access structure with
lower bounds. Construction of the scheme is based on the Maximum Distance Separable (…