List of Accepted Papers
No. of Submissions: 136
Accepted Regular Papers: 24
Accepted Short Papers: 16
Differential Fault Analysis on Tiaoxin and AEGIS Family of Ciphers
Prakash Dey (University of Calcutta, India); Raghvendra Singh (Indian Institute of Science Education and Research Kolkata, India); Santanu Sarkar (Indian Institute of Technology Madras); Avishek Adhikari (University of Calcutta, India) |
Enhanced Image Based Authentication with Secure Key Exchange Mechanism Using ECC in Cloud
Anurag Singh Tomar (Center for Information Technology, CoES, UPES); Shashi Kant Shankar (Shiv Nadar University); Manmohan Sharma and Aditya Bakshi (Lovely Professional University, India) |
Extreme Learning Machine for Semi-Blind Grayscale Image Watermarking in DWT Domain
Ankit Rajpal and Anurag Mishra (University of Delhi ; Deendayal Upadhyay College, India); Rajni Bala (University of Delhi, India) |
Prediction of Malicious Domains Using Smith Waterman Algorithm
Ashwini B (Amrita University; Amrita School of Engineering, Coimbatore, India); Vijay Krishna Menon and Soman K P (Amrita Vishwa Vidyapeetham, India) |
Enhancement of Detecting Wicked Website Through Intelligent Methods
Tarik A Rashid (Salahaddin University-Erbil ; Salahaddin University-Erbil, Iraq); Salwa O Mohamad (University of Sulaymaniyah, Iraq) |
A Secure One-Time Password Authentication Scheme Using Image Texture Features
Maitreya Maity, Dhiraj Manohar Dhane and Tushar Mungle (Indian Institute of Technology Kharagpur, India); Rupak Chakraborty (DIT University, Dehradun, Vill-Makkawala, Mussorie Diversion Road, India); Vasant Deokamble (SPPU Pune, India); Chandan Chakraborty (IIT Kharagpur, India) |
Secure Outsourcing of Closest Pair of Points
Chandrasekhar Kuruba and Kethzi Gilbert (National Institute of Technology Goa, India); Prabhav Sidhaye (Nationsl Institute of Technology, Goa, India); Gaurav Pareek (National Institute of Technology Goa); Purushothama Byrapura Rangappa (National Institute of Technology Goa, India) |
A Random Key Generation Scheme Using Primitive Polynomials Over GF(2)
Inderjeet Singh (National Institute of Technology, Karnataka, India); Alwyn Roshan Pais (NITK, Suratkal, Mangalore India, India) |
Discovering Vulnerable Functions: A Code Similarity Based Approach
Aditya Chandran and Lokesh Jain (International Institute of Information Technology, Hyderabad, India); Sanjay Rawat (IIIT Hyderabad, India); Kannan Srinathan (International Institute of Information Technology, India) |
Analyzing the Applicability of Bitsum Algorithm on LSB Steganography Technique
Amandeep Bagga and Geetha Ganesan (Lovely Professional University, India) |
Efficient Key Management in IoT Using Mobile Aggregator
Sumit Saurabh (National Institute of Technology Karnataka, Surathkal, India); Alwyn Roshan Pais (National Institute of Technology Karnataka Surathkal); Sumanta Chatterjee (National Institute of Technology, Karnataka, India) |
Secure Certificateless Signature Scheme with Batch Verification From Bilinear Pairings
N B. Gayathri and P Vasudeva Reddy (Andhra University, India) |
Multi-factor Authentication Using Recursive XOR-based Visual Cryptography in Online Voting System
P. Sanyasi Naidu (GITAM University, India); Reena Kharat (Pimpri Chinchwad College of Engineering, pune, India) |
Touch and Track: An Anti-Theft and Data Protection Technique for Smartphones
Sohini Roy (Arizona State University, USA); Arvind Kumar Shah (IIEST, Shibpur; Microsoft, India); Uma Bhattacharya (Bengal Engineering ; Science University, India) |
On the Use of Asynchronous Cellular Automata in Symmetric-Key Cryptography
Biswanath Sethi (Indian Institute of Engineering Science ; Technology, Shibpur, India); Sukanta Das (Indian Institute of Engineering Science and Technology, Shibpur, India) |
Computing Mod with a Variable Lookup Table
Mark Will and Ryan Ko (University of Waikato, New Zealand) |
Mutual Authentication Based on HECC for RFID Implant System
Asha John (Indian Institute of Information Technology and Management Kerala, India); Sabu M Thampi (Indian Institute of Information Technology and Management - Kerala, India) |
A Secure Keyword Ordered Multiuser Searchable Encryption Framework
Kulvaibhav Kaushik (Infosys Ltd, India); Vijayaraghavan Varadharajan (Infosys Limited, India) |
Diagnosis of Multiple Stuck-at Faults Using Fault Element Graph with Reduced Power
Midhila E. r., Ashwin Swaminathan and Binitaa Lekshmi (Amrita School of Engineering, India); Anita Jp (Amrita Vishwa Vidyapeetham, India) |
An Image Forensic Technique for Detection of Copy-Move Forgery in Digital Image
Ashwini Malviya and Siddharth Ladhake (Sipna College of Engineering ; Technology, India) |
An Automated Methodology for Secured User Allocation in Cloud
Srijita Basu, Anirban Sengupta and Chandan Mazumdar (Jadavpur University, India) |
Tracking Inbound Enemy Missile for Interception From Target Aircraft Using Extended Kalman Filter
TS Gokkul Nath (Amrita Vishwa Vidhyapeetham, India); Sudheesh Padmanabhan and Jayakumar M (Amrita Vishwa Vidyapeetham, India) |
Nonlinear Tracking of Target Submarine Using Extended Kalman Filter (EKF)
S Vikranth (Amrita Vishwa Vidyapeetham University, India); Sudheesh Padmanabhan and Jayakumar M (Amrita Vishwa Vidyapeetham, India) |
Key Identifications Using Hebbian Learning
Bhavya Murmu, Anu Kumari and Manu Malkani (Birla Institute of Technology, Mesra, India); Sanjeet Kumar (BIT Mesra ; BIT Mesra, Ranchi, India) |
Credibility Assessment of Public Pages Over Facebook
Himanshi Agrawal (Indira Gandhi Delhi Technical University For Women, India); Rishabh Kaushal (Indira Gandhi Delhi Technical University for Women, India) |
Intrusion Detection Using Improved Decision Tree Algorithm with Binary and Quad Split
Shubha Puthran (MPSTME, SVKM's NMIMS University ; MPSTME, India); Ketan Shah (MPSTME, India) |
SocialBot: Behavioral Analysis & Detection
Madhuri Dewangan (Indira Gandhi Delhi Technical University For Women, India); Rishabh Kaushal (Indira Gandhi Delhi Technical University for Women, India) |
Secure and Privacy Preserving Mobile Healthcare Data Exchange Using Cloud Service
Doyel Pal and Gobinda Senchury (LaGuardia Community College, CUNY, USA); Praveen Khethavath (LaGuardia Community College, USA) |
Cryptographic Assessment of SSL/TLS Servers Popular in India
Prakhar Jain (Indian Institute of Technology (BHU) Varanasi, India); K K Shukla (IIT-BHU, India) |
Two Level Signature Based Authorization Model for Secure Data Warehouse
Anjana Gosain (GGSIP University, India); Amar Arora (National Informatics Centre, India) |
Vulnebdroid: Automated Vulnerability Score Calculator for Android Applications
Sugandha Gupta and Rishabh Kaushal (Indira Gandhi Delhi Technical University for Women, India) |
MalJs:Lexical, Structural and Behavioral Analysis of Malicious JavaScripts Using Ensemble Classifier
Surendran K (Amrita University, Amrita Vishwa Vidyapeetham, India); Prabaharan Poornachandran (Amrita University, India); Aravind Ashok Nair (Amrita University; Amrita Center for Cyber Security, Amritapuri Campus, India); Srinath N (Amrita University, India); Sudhir Kumar Y (Amrita University ; Amrita Center for Cyber Security, Amritapuri Campus, India); Hrudya P (Research Associate at Amrita Center for Cyber Security, India) |
Secure Authentication in Online Voting System Using Multiple Image Secret Sharing
P. Sanyasi Naidu (GITAM University, India); Reena Kharat (Pimpri Chinchwad College of Engineering, pune, India) |
Cloud Resources Optimization for Air Pollution Monitoring Devices and Avoiding Post Pillar Problem
Parampreet Singh (Guru Nanak Dev University, Regional Campus, Jalandhar); Pankaj Deep Kaur (GNDU Regional Campus Jalandhar, India) |
Security Requirements Elicitation and Modeling Authorizations
Rajat Goel, Mahesh Chandra Govil and Girdhari Singh (Malaviya National Institute of Technology Jaipur, India) |
A Comparison of Diffusion Properties of Salsa, ChaCha, and MCC Core
Rajeev Sobti and Geetha Ganesan (Lovely Professional University, India) |
Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment
Thangam V and Chandra Sekaran K (National Institute of Technology Karnataka, India) |
Performance Analysis of Spectrum Sensing Algorithm Using Multiple Antenna in Cognitive Radio
Komal Pawar (Savitribai Phule Pune University, India); Tanuja Dhope (GHRCEM Pune University, India) |
A Passive Blind Approach for Image Splicing Detection Based DWT and LBP Histograms
Mandeep Kaur (University Institute of Engineering and Technology, India); Savita Gupta (UIET, Panjab University Chandigarh, India) |
Provenance-Aware NoSQL Databases
Anu Chacko (NIT Calicut, India); Munavar Fairooz (Infotrellis, India); S D Madhu Kumar (National Institute of Technology Calicut, India) |