SNDS 2012, Trivandrum, India
Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, Jose M. Alcaraz Calero, Tony Thomas (Eds.): Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Springer 2012 Communications in Computer and Information Science 335 ISBN 978-3-642-34134-2
Regular Papers
Vanga Odelu, Ashok Kumar Das, Adrijit Goswami: A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials. 1-10
B. R. Purushothama, Bharat Amberker: Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. 11-22
Nelcileno Araújo, Ruy de Oliveira, Ed Wilson Tavares Ferreira, Valtemir Nascimento, Ailton Shinoda Akira, Bharat K. Bhargava: Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection. 23-34
Prashant Kumar Mishra, Kunwar Singh, Sudhanshu Baruntar: ID-Based Threshold Signcryption and Group Unsigncryption. 35-44
Manjunath Mattam: Protocol for Secure Submissions into Learning Management Systems. 45-53
Monika Darji, Bhushan Trivedi: Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detection in MANET. 54-63
Somanath Tripathy, Debasish Sahoo: WAKE: Authentication and Key Establishment for Wireless Mesh Network. 64-74
Jinu Elizabeth John, A. S. Remya Ajai, Prabaharan Poornachandran: Effective Implementation of DES Algorithm for Voice Scrambling. 75-84
Amine Abidi, Ghazi Ben Ayed, Farouk Kamoun: Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in Content Centric Internetworking. 85-96

Srikumar Manghat: A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbers. 117-126
B. G. Nagaraja, H. S. Jayanna: Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC. 127-134
B. R. Purushothama, Kusuma Shirisha, Bharat Amberker: Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree. 135-146
Ram Shringar Raw, Daya Krishan Lobiyal, Sanjoy Das: An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks. 147-156
V. Vasanthi, M. Hemalatha: Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool. 157-167
Aravind Ashok, Prabaharan Poornachandran, Krishnashree Achuthan: Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functions. 168-177
Lucas Rodrigo Raso Mattos, Vijayaraghavan Varadharajan, Rajarathnam Nallusamy: Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases. 178-184
Tiana Razafindralambo, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet: A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. 185-194
Enrico Cambiaso, Gianluca Papaleo, Maurizio Aiello: Taxonomy of Slow DoS Attacks to Web Applications. 195-204
Harshvardhan Tiwari, Ankit Luthra, Himanshu Goel, Sambhav Sharma, Krishna Asawa: Crypto-Precision: Testing Tool for Hash Function. 205-214
P. V. Sruthi, Prabaharan Poornachandran, A. S. Remya Ajai: Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES. 215-224
S. Dija, T. R. Deepthi, C. Balan, K. L. Thomas: Towards Retrieving Live Forensic Artifacts in Offline Forensics. 225-233
Balan Chelliah, Divya S. Vidyadharan, P. Shabana, K. L. Thomas: Carving of Bitmap Files from Digital Evidences by Contiguous File Filtering. 234-239
Adarsh Kumar, Alok Aggarwal: Lightweight Cryptographic Primitives for Mobile Ad Hoc Networks. 240-251
S. Fouzul Hidhaya, Angelina Geetha: Intrusion Protection against SQL Injection and Cross Site Scripting Attacks Using a Reverse Proxy. 252-263
P. R. Mahalingam: Three-Way Handshake-Based OTP Using Random Host-Side Keys for Effective Key Transfer in Symmetric Cryptosystems. 264-271
Muthulakshmi Angamuthu, Anitha Ramalingam, S. Rohini, Krishnan Princy: Identity Based Privacy Preserving Dynamic Broadcast Encryption for Multi-privileged Groups. 272-282
Jerzy Konorski, Piotr Pacyna, Grzegorz Kolaczek, Zbigniew Kotulski, Krzysztof Cabaj, Pawel Szalachowski: A Virtualization-Level Future Internet Defense-in-Depth Architecture. 283-292
Stefan-Vladimir Ghita, Victor Valeriu Patriciu, Ion Bica: Experimental DRM Model Using Mobile Code and White-Box Encryption. 293-303
Dheerendra Mishra, Sourav Mukhopadhyay: Towards a Secure, Transparent and Privacy-Preserving DRM System. 304-313
M. T. Chitra, R. Priya, Elizabeth Sherly: Time Based Constrained Object Identification in a Dynamic Social Network. 314-322
Anjali Avinash Chandavale, Ashok M. Sapkal: A New Approach towards Segmentation for Breaking CAPTCHA. 323-335
Aman Jantan, Mohammad Rasmi, Mohd Izham Ibrahim, Azri H. A. Rahman: A Similarity Model to Estimate Attack Strategy Based on Intentions Analysis for Network Forensics. 336-346
International Workshop on Security in Self-Organising Networks (SelfNet'12)
Nilanjan Dey, Anamitra Bardhan Roy, Achintya Das, Sheli Sinha Chaudhuri: Stationary Wavelet Transformation Based Self-recovery of Blind-Watermark from Electrocardiogram Signal in Wireless Telecardiology. 347-357
Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy: eCloudIDS - Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment. 358-371
Subhashis Banerjee, Koushik Majumder: A Comparative Study on Wormhole Attack Prevention Schemes in Mobile Ad-Hoc Network. 372-384
Philipp Digeser, Marco Tubolino, Martin Klemm, Axel Sikora: Management of Routed Wireless M-Bus Networks for Sparsely Populated Large-Scale Smart-Metering Installations. 385-395
Subhashis Banerjee, Koushik Majumder: A Survey of Blackhole Attacks and Countermeasures in Wireless Mobile Ad-hoc Networks. 396-407
International Workshop on Intelligence and Security Informatics for International Security (IIS'12)
Keerthi Balasundaram, Madhan Kumar Srinivasan, K. Sarukesi: iReSign - Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture Using Hybrid Region-Based Shape Representation Techniques. 408-421
Work-in-Progress
S. Santhanalakshmi, T. S. B. Sudarshan, Gopal K. Patra: Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation. 422-431
Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy: eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment. 432-443

Deepa Krishnan, Madhumita Chatterjee: An Adaptive Distributed Intrusion Detection System for Cloud Computing Framework. 466-473
Praneet Saurabh, Bhupendra Verma, Sanjeev Sharma: Biologically Inspired Computer Security System: The Way Ahead. 474-484
Debajit Sensarma, Koushik Majumder: A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET. 485-496
Nitin Goel, Shruti Sangwan, Ajay Jangra: Efficient Weighted innovative Routing Protocol (EWiRP) to Balance Load in Mobile Ad Hoc Networks (MANETs): Simulation and Feasibility Analysis. 497-506



