Security in Computing and Communications

Third International Symposium, SSCC 2015, Kochi, India, August 10-13, 2015. Proceedings

  • Jemal H. Abawajy
  • Sougata Mukherjea
  • Sabu M. Thampi
  • Antonio Ruiz-Martínez

Part of the Communications in Computer and Information Science book series (CCIS, volume 536)

Table of contents

  1. Front Matter
    Pages I-XXI
  2. Security in Cloud Computing

    1. Front Matter
      Pages 1-1
    2. Dapeng Xiong, Peng Zou, Jun Cai, Jun He
      Pages 3-12
    3. Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen
      Pages 13-23
    4. Deepnarayan Tiwari, G. R. Gangadharan
      Pages 24-35
    5. Naveen Kumar, Anish Mathuria, Manik Lal Das
      Pages 36-44
    6. Muthukumar B., Praveen Kumar Rajendran
      Pages 54-65
    7. Ronak Vyas, Alok Singh, Jolly Singh, Gunjan Soni, B. R. Purushothama
      Pages 66-77
    8. Sandeep Kakde, Mithilesh Mahindra, Atish Khobragade, Nikit Shah
      Pages 78-85
  3. Authentication and Access Control Systems

    1. Front Matter
      Pages 87-87
    2. Quist-Aphetsi Kester, Laurent Nana, Anca Christine Pascu, Sophie Gire, Jojo M. Eghan, Nii Narku Quaynor
      Pages 89-98
    3. Sarat kr. Chettri, B. Borah
      Pages 99-109
    4. Byrapura Rangappa Purushothama, B. B. Amberker
      Pages 122-133
    5. Doyel Pal, Praveenkumar Khethavath, Johnson P. Thomas, Tingting Chen
      Pages 146-156
    6. A. Athira Ram, T. S. Jyothis
      Pages 157-167
    7. Nazneen Akhter, Hanumant Gite, Gulam Rabbani, Karbhari Kale
      Pages 168-175
    8. Chandra Mouliswaran Subramanian, Aswani Kumar Cherukuri, Chandrasekar Chelliah
      Pages 176-185

About these proceedings

Introduction

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.

Keywords

access control anomaly detection attacks authentication biometrics cloud computing computer networks cryptography forensics mobile ad hoc networks network security security and privacy security protocols security services steganography system and network security wireless sensor networks

Editors and affiliations

  • Jemal H. Abawajy
    • 1
  • Sougata Mukherjea
    • 2
  • Sabu M. Thampi
    • 3
  • Antonio Ruiz-Martínez
    • 4
  1. 1.Deakin UniversityGeelongAustralia
  2. 2.IBM Research-IndiaNew DelhiIndia
  3. 3.Indian Institute of Information Technology and ManagementKeralaIndia
  4. 4.University of MurciaEspinardoSpain

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-22915-7
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-22914-0
  • Online ISBN 978-3-319-22915-7
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • About this book
Industry Sectors
Pharma
Automotive
Electronics
Telecommunications
Consumer Packaged Goods
Aerospace