- Dheerendra Mishra, Sourav Mukhopadhyay:
Towards a Secure, Transparent and Privacy-Preserving DRM System. SNDS 2012: 304-313 - Prashant Kumar Mishra, Kunwar Singh, Sudhanshu Baruntar:
ID-Based Threshold Signcryption and Group Unsigncryption. SNDS 2012: 35-44 - B. G. Nagaraja, Haradagere Siddaramaiah Jayanna:
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCC. SNDS 2012: 127-134 - Vanga Odelu, Ashok Kumar Das, Adrijit Goswami:
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials. SNDS 2012: 1-10 - B. R. Purushothama, Bharat Amberker:
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Polynomial Interpolation. SNDS 2012: 11-22 - B. R. Purushothama, Kusuma Shirisha, Bharat Amberker:
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Using Binomial Key Tree. SNDS 2012: 135-146 - Ram Shringar Raw, Daya Krishan Lobiyal, Sanjoy Das:
An Analytical Approach to Position-Based Routing Protocol for Vehicular Ad Hoc Networks. SNDS 2012: 147-156 - Tiana Razafindralambo, Guillaume Bouffard, Bhagyalekshmy N. Thampi, Jean-Louis Lanet:
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacks. SNDS 2012: 185-194 - S. Santhanalakshmi, T. S. B. Sudarshan, Gopal K. Patra:
Neural Synchronization by Mutual Learning Using Genetic Approach for Secure Key Generation. SNDS 2012: 422-431 - Praneet Saurabh, Bhupendra Verma, Sanjeev Kumar Sharma:
Biologically Inspired Computer Security System: The Way Ahead. SNDS 2012: 474-484 - Debajit Sensarma, Koushik Majumder:
A Comparative Analysis of the Ant Based Systems for QoS Routing in MANET. SNDS 2012: 485-496 - Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy:
eCloudIDS - Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment. SNDS 2012: 358-371 - Madhan Kumar Srinivasan, K. Sarukesi, Ashima Keshava, P. Revathy:
eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation Using Self-Organizing Map (SOM) for Secure Cloud Computing Environment. SNDS 2012: 432-443 - P. V. Sruthi, Prabaharan Poornachandran, A. S. Remya Ajai:
Performance Analysis and Improvement Using LFSR in the Pipelined Key Scheduling Section of DES. SNDS 2012: 215-224 - Adapa Tataram, Alwyn Roshan Pais:
Location Estimation of Mobile in GSM and CDMA Networks. SNDS 2012: 456-465 - Harshvardhan Tiwari, Ankit Luthra, Himanshu Goel, Sambhav Sharma, Krishna Asawa:
Crypto-Precision: Testing Tool for Hash Function. SNDS 2012: 205-214 - Somanath Tripathy, Debasish Sahoo:
WAKE: Authentication and Key Establishment for Wireless Mesh Network. SNDS 2012: 64-74 - V. Vasanthi, M. Hemalatha:
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Using Bonnmotion Tool. SNDS 2012: 157-167 - Sabu M. Thampi, Albert Y. Zomaya, Thorsten Strufe, José M. Alcaraz Calero, Tony Thomas:
Recent Trends in Computer Networks and Distributed Systems Security - International Conference, SNDS 2012, Trivandrum, India, October 11-12, 2012. Proceedings. Communications in Computer and Information Science 335, Springer 2012, ISBN 978-3-642-34134-2 [contents]