List of Accepted Papers



No. of Submissions: 136
Accepted Regular Papers: 24
Accepted Short Papers: 16
 
Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers
Prakash Dey (University of Calcutta, India); Raghvendra Singh (Indian Institute of Science Education and Research Kolkata, India); Santanu Sarkar (Indian Institute of Technology Madras); Avishek Adhikari (University of Calcutta, India)

Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud
Anurag Singh Tomar (Center for Information Technology, CoES, UPES); Shashi Kant Shankar (Shiv Nadar University); Manmohan Sharma and Aditya Bakshi (Lovely Professional University, India)

Extreme Learning Machine for Semi-Blind Grayscale Image Watermarking in DWT Domain
Ankit Rajpal and Anurag Mishra (University of Delhi ; Deendayal Upadhyay College, India); Rajni Bala (University of Delhi, India)

Prediction of Malicious Domains Using Smith Waterman Algorithm
Ashwini B (Amrita University; Amrita School of Engineering, Coimbatore, India); Vijay Krishna Menon and Soman K P (Amrita Vishwa Vidyapeetham, India)

Enhancement of Detecting Wicked Website Through Intelligent Methods
Tarik A Rashid (Salahaddin University-Erbil ; Salahaddin University-Erbil, Iraq); Salwa O Mohamad (University of Sulaymaniyah, Iraq)

A Secure One-Time Password Authentication Scheme Using Image Texture Features
Maitreya Maity, Dhiraj Manohar Dhane and Tushar Mungle (Indian Institute of Technology Kharagpur, India); Rupak Chakraborty (DIT University, Dehradun, Vill-Makkawala, Mussorie Diversion Road, India); Vasant Deokamble (SPPU Pune, India); Chandan Chakraborty (IIT Kharagpur, India)

Secure Outsourcing of Closest Pair of Points
Chandrasekhar Kuruba and Kethzi Gilbert (National Institute of Technology Goa, India); Prabhav Sidhaye (Nationsl Institute of Technology, Goa, India); Gaurav Pareek (National Institute of Technology Goa); Purushothama Byrapura Rangappa (National Institute of Technology Goa, India)

A Random Key Generation Scheme Using Primitive Polynomials Over GF(2)
Inderjeet Singh (National Institute of Technology, Karnataka, India); Alwyn Roshan Pais (NITK, Suratkal, Mangalore India, India)

Discovering Vulnerable Functions: A Code Similarity Based Approach
Aditya Chandran and Lokesh Jain (International Institute of Information Technology, Hyderabad, India); Sanjay Rawat (IIIT Hyderabad, India); Kannan Srinathan (International Institute of Information Technology, India)

Analyzing the Applicability of Bitsum Algorithm on LSB Steganography Technique
Amandeep Bagga and Geetha Ganesan (Lovely Professional University, India)

Efficient Key Management in IoT Using Mobile Aggregator
Sumit Saurabh (National Institute of Technology Karnataka, Surathkal, India); Alwyn Roshan Pais (National Institute of Technology Karnataka Surathkal); Sumanta Chatterjee (National Institute of Technology, Karnataka, India)

Secure Certificateless Signature Scheme with Batch Verification From Bilinear Pairings
N B. Gayathri and P Vasudeva Reddy (Andhra University, India)

Multi-factor Authentication Using Recursive XOR-based Visual Cryptography in Online Voting System
P. Sanyasi Naidu (GITAM University, India); Reena Kharat (Pimpri Chinchwad College of Engineering, pune, India)

Touch and Track: An Anti-Theft and Data Protection Technique for Smartphones
Sohini Roy (Arizona State University, USA); Arvind Kumar Shah (IIEST, Shibpur; Microsoft, India); Uma Bhattacharya (Bengal Engineering ; Science University, India)

On the Use of Asynchronous Cellular Automata in Symmetric-Key Cryptography
Biswanath Sethi (Indian Institute of Engineering Science ; Technology, Shibpur, India); Sukanta Das (Indian Institute of Engineering Science and Technology, Shibpur, India)

Computing Mod with a Variable Lookup Table
Mark Will and Ryan Ko (University of Waikato, New Zealand)

Mutual Authentication Based on HECC for RFID Implant System
Asha John (Indian Institute of Information Technology and Management Kerala, India); Sabu M Thampi (Indian Institute of Information Technology and Management - Kerala, India)

A Secure Keyword Ordered Multiuser Searchable Encryption Framework
Kulvaibhav Kaushik (Infosys Ltd, India); Vijayaraghavan Varadharajan (Infosys Limited, India)

Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced Power
Midhila E. r., Ashwin Swaminathan and Binitaa Lekshmi (Amrita School of Engineering, India); Anita Jp (Amrita Vishwa Vidyapeetham, India)

An Image Forensic Technique for Detection of Copy-Move Forgery in Digital Image
Ashwini Malviya and Siddharth Ladhake (Sipna College of Engineering ; Technology, India)

An Automated Methodology for Secured User Allocation in Cloud
Srijita Basu, Anirban Sengupta and Chandan Mazumdar (Jadavpur University, India)

Tracking Inbound Enemy Missile for Interception From Target Aircraft Using Extended Kalman Filter
TS Gokkul Nath (Amrita Vishwa Vidhyapeetham, India); Sudheesh Padmanabhan and Jayakumar M (Amrita Vishwa Vidyapeetham, India)

Nonlinear Tracking of Target Submarine Using Extended Kalman Filter (EKF)
S Vikranth (Amrita Vishwa Vidyapeetham University, India); Sudheesh Padmanabhan and Jayakumar M (Amrita Vishwa Vidyapeetham, India)

Key Identifications Using Hebbian Learning
Bhavya Murmu, Anu Kumari and Manu Malkani (Birla Institute of Technology, Mesra, India); Sanjeet Kumar (BIT Mesra ; BIT Mesra, Ranchi, India)

Credibility Assessment of Public Pages Over Facebook
Himanshi Agrawal (Indira Gandhi Delhi Technical University For Women, India); Rishabh Kaushal (Indira Gandhi Delhi Technical University for Women, India)

Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split
Shubha Puthran (MPSTME, SVKM's NMIMS University ; MPSTME, India); Ketan Shah (MPSTME, India)

SocialBot: Behavioral Analysis & Detection
Madhuri Dewangan (Indira Gandhi Delhi Technical University For Women, India); Rishabh Kaushal (Indira Gandhi Delhi Technical University for Women, India)

Secure and Privacy Preserving Mobile Healthcare Data Exchange Using Cloud Service
Doyel Pal and Gobinda Senchury (LaGuardia Community College, CUNY, USA); Praveen Khethavath (LaGuardia Community College, USA)

Cryptographic Assessment of SSL/TLS Servers Popular in India
Prakhar Jain (Indian Institute of Technology (BHU) Varanasi, India); K K Shukla (IIT-BHU, India)

Two Level Signature Based Authorization Model for Secure Data Warehouse
Anjana Gosain (GGSIP University, India); Amar Arora (National Informatics Centre, India)

Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications
Sugandha Gupta and Rishabh Kaushal (Indira Gandhi Delhi Technical University for Women, India)

MalJs:Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier
Surendran K (Amrita University, Amrita Vishwa Vidyapeetham, India); Prabaharan Poornachandran (Amrita University, India); Aravind Ashok Nair (Amrita University; Amrita Center for Cyber Security, Amritapuri Campus, India); Srinath N (Amrita University, India); Sudhir Kumar Y (Amrita University ; Amrita Center for Cyber Security, Amritapuri Campus, India); Hrudya P (Research Associate at Amrita Center for Cyber Security, India)

Secure Authentication in Online Voting System Using Multiple Image Secret Sharing
P. Sanyasi Naidu (GITAM University, India); Reena Kharat (Pimpri Chinchwad College of Engineering, pune, India)

Cloud Resources Optimization for Air Pollution Monitoring Devices and Avoiding Post Pillar Problem
Parampreet Singh (Guru Nanak Dev University, Regional Campus, Jalandhar); Pankaj Deep Kaur (GNDU Regional Campus Jalandhar, India)

Security Requirements Elicitation and Modeling Authorizations
Rajat Goel, Mahesh Chandra Govil and Girdhari Singh (Malaviya National Institute of Technology Jaipur, India)

A Comparison of Diffusion Properties of Salsa, ChaCha, and MCC Core
Rajeev Sobti and Geetha Ganesan (Lovely Professional University, India)

Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment
Thangam V and Chandra Sekaran K (National Institute of Technology Karnataka, India)

Performance Analysis of Spectrum Sensing Algorithm Using Multiple Antenna in Cognitive Radio
Komal Pawar (Savitribai Phule Pune University, India); Tanuja Dhope (GHRCEM Pune University, India)

A Passive Blind Approach for Image Splicing Detection Based DWT and LBP Histograms
Mandeep Kaur (University Institute of Engineering and Technology, India); Savita Gupta (UIET, Panjab University Chandigarh, India)

Provenance-Aware NoSQL Databases
Anu Chacko (NIT Calicut, India); Munavar Fairooz (Infotrellis, India); S D  Madhu Kumar (National Institute of Technology Calicut, India)