Registered Papers

 

32

Mutual Authentication of RFID Tag with Multiple Readers
Selwyn Piramuthu, University of Florida, USA

47

Design space exploration of power efficient cache design techniques
H V Ravish Aradhya, Ashish Kapania, Aseem Trivedi and Ajith A, RV College of Engineering, India

61

Secured WiMAX Communication at 60 GHz Millimeter-Wave for Road-Safety
Rabindranath Bera, Subir Kumar Sarkar, Bikash Sharma, Samarendra Nath Sur, Debasish Bhaskar and Soumyasree Bera, Sikkim Manipal University India

67

A Light-Weight Protocol for Data Integrity and Authentication in Wireless Sensor Networks
Jibi Abraham, Nagasimha M P, Mohnish Bhatt and Chaitanya Naik, College of Engineering , India and M.S Ramaiah Institute of Technology, India

103

Intrusion Detection using Flowbased Analysis of Network Traffic
Jisa David1 and Ciza Thomas2, 1Rajagiri School of Engineering & Technology, India and 2College of Engineering, Trivandrum, India

107

A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network
Haimabati Dey and Raja Datta, Indian Institute of Technology - Kharagpur, India

128

Formal Verification of A Secure Mobile Banking Protocol
Huy Hoang Ngo, Osama Dandash, Phu Dung Le, Bala Srinivasan and Campbell Wilson, Monash University - Melbourne, Australia

139

A Novel Higly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication
Tanmay Bhattacharya1, Shirshendu Hore2 and S. R. Bhadra Chaudhuri3, 1JIS College of Engineering Kalyani, India, 2Hooghly Eng & Tech College, India and 3BESU, India

141

An Active Host-based Detection Mechanism for ARP-related Attacks
S Roopa, R Ratti, Neminath H, F.A. Barbhuiya, S Biswas, S Nandi, A Sur and V Ramachandran, Indian Institute of Technology - Guwahati, India

150

Privacy Preservation Na´ve Bayes Classification using Trusted Third Party Computation over Vertical Partitioned Distributed Progressive Sequential Data Streams
Keshavamurthy B.N. and Durga Toshniwal, Indian Institute of Technology - Roorkee, India.

151

Copyright Protection in Digital Multimedia
Santosh Kumar, Ankur Gupta and Sukumar Nandi, Indian Institute of Technology Guwahti, India

174

Trust as a Standard for e-Commerce Infrastructure
Shabana1 and Mohammad Arif2, 1LFMVNIET, India and 2GSMVNIET, India

177

A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network
Sandip Chakraborty, Soumyadip Majumder, Ferdous A. Barbhuiya and Sukumar Nandi, Indian Institute of Technology - Guwahati, India

180

Secure Data Aggregation in Wireless Sensor Networks using Privacy Homomorphism
M.K.Sandhya and K.Murugan, Anna University - Chennai, India

187

Deniable Encryption in Replacement of Untappable Channel to Prevent Coercion
Jaydeep Howlader, Vivek Nair and Saikat Basu, National Institute of Technology, india

191

Author Identification in e-mail Forensic through Service Oriented Architecture
Pushpendra Kumar Pateriya, Shivani Mishra, and Shefalika Ghosh Samaddar, CSED Motilal Nehru National Institute of Technology, India

196

A Chaos Based Approach for improving Non linearity in S Box Design of Symmetric Key Cryptosystems
Jeyamala.C and Subramanyan.B, Thiagarajar College of Engineering, India

197

Implementation of Invisible Digital Watermarking by Embedding Data in Arithmetically Compressed Form into Image using Variable-Length Key
Sabyasachi Samanta1 and Saurabh Dutta2, 1Haldia Institute of Technology, INDIA and 2B. C. Roy Engineering College, india

Accepted Papers

 

 

3

Wireless Security Measurement Using Data Value Index
Reza Amirpoor1, Ajay Kumar2 and Satish R. Deavne3, 1Bharati Vidyapeeth University, Pune, INDIA, 2JSPM’s JAYAWANT Institute Tathawade, india and 3D. Y. Patil Ramrao Adik Institute of Technology, india

9

Intrusion Detection Wireless Ad Hoc Network
Banshilal Patidar and Pinaki A.Ghosh, Bansal Institute of Science and Technology, india

32

Mutual Authentication of RFID Tag with Multiple Readers
Selwyn Piramuthu, University of Florida, USA

38

Client side defense against MITM attacks on SSL/TLS using Negative Feedback method
Nikhil Mittal, Tata Consultancy Services, India

47

Design space exploration of power efficient cache design techniques
H V Ravish Aradhya, Ashish Kapania, Aseem Trivedi and Ajith A, RV College of Engineering, India

55

A MBD-SIIT as a Multi homing based a new IPv4/IPv6 Novel transition mechanism in 4G networks.
Hanumanthappa.J1, Manjaiah.D.H2, 1University of Mysore, India and 2Mangalore University, India

61

Secured WiMAX Communication at 60 GHz Millimeter-Wave for Road-Safety
Rabindranath Bera, Subir Kumar Sarkar, Bikash Sharma, Samarendra Nath Sur, Debasish Bhaskar and Soumyasree Bera, Sikkim Manipal University India

67

A Light-Weight Protocol for Data Integrity and Authentication in Wireless Sensor Networks
Jibi Abraham, Nagasimha M P, Mohnish Bhatt and Chaitanya Naik, College of Engineering , India and M.S Ramaiah Institute of Technology, India

70

Adaptive DS-CDMA Receiver with Code Tracking in Phase Unknown Environments
J.Ravindrababu1, P.Venumadhav1 and E.V.Krishnarao2, 1Prasad V. Potluri Siddhartha Institute of Technology, India and 2Sri Mittapalli College Of Engineering, India

86

Coastal Safety Oceanic Navigation Using Non-Gps Di gitised
R. Suresh, T. Shankar and V. Suganthi, VIT University , India

99

Power Optimization through Efficient Routing Technique for Dynamic Source Routing Protocol
M.Neelakantappa1, A.Damodaram2 and B.Satyanarayana3, 1Brindavan Inst. of Tech & Science - Peddatekur, India, 2J.N.T.University - Hyderabad, india and 3S.K.University - Anantapur, india

103

Intrusion Detection using Flowbased Analysis of Network Traffic
Jisa David1 and Ciza Thomas2, 1Rajagiri School of Engineering & Technology, India and 2College of Engineering, Trivandrum, India

105

Channel Adaptive MAC Protocol with Traffic-Aware Distributed Power Management in Wireless Sensor Networks-Some Performance Issues
Binu G S and K Poulose Jacob, Cochin university of Science and technology, India

107

A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network
Haimabati Dey and Raja Datta, Indian Institute of Technology - Kharagpur, India

117

Legitimate Spyware Detection using Weighted Feature by Vector Space Model for EULA
Safvan Vahora, Mosin Hasan and Amit Jadav, A.D. Patel Institute of Technology, India.

123

Improving Data Accessibility in Mobile Ad Hoc Networks
R.Nandhakumar1 and A.Saravanan2, 1Sree Sastha Institute of Engineering & Technology, India and 2Kalasalingam University, India

128

Formal Verification of A Secure Mobile Banking Protocol
Huy Hoang Ngo, Osama Dandash, Phu Dung Le, Bala Srinivasan and Campbell Wilson, Monash University - Melbourne, Australia

139

A Novel Higly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication
Tanmay Bhattacharya1, Shirshendu Hore2 and S. R. Bhadra Chaudhuri3, 1JIS College of Engineering Kalyani, India, 2Hooghly Eng & Tech College, India and 3BESU, India

141

An Active Host-based Detection Mechanism for ARP-related Attacks
S Roopa, R Ratti, Neminath H, F.A. Barbhuiya, S Biswas, S Nandi, A Sur and V Ramachandran, Indian Institute of Technology - Guwahati, India

150

Privacy Preservation Naïve Bayes Classification using Trusted Third Party Computation over Vertical Partitioned Distributed Progressive Sequential Data Streams
Keshavamurthy B.N. and Durga Toshniwal, Indian Institute of Technology - Roorkee, India.

151

Copyright Protection in Digital Multimedia
Santosh Kumar, Ankur Gupta and Sukumar Nandi, Indian Institute of Technology Guwahti, India

174

Trust as a Standard for e-Commerce Infrastructure
Shabana1 and Mohammad Arif2, 1LFMVNIET, India and 2GSMVNIET, India

177

A Scalable Rekeying Scheme for Secure Multicast in IEEE 802.16 Network
Sandip Chakraborty, Soumyadip Majumder, Ferdous A. Barbhuiya and Sukumar Nandi, Indian Institute of Technology - Guwahati, India

180

Secure Data Aggregation in Wireless Sensor Networks using Privacy Homomorphism
M.K.Sandhya and K.Murugan, Anna University - Chennai, India

187

Deniable Encryption in Replacement of Untappable Channel to Prevent Coercion
Jaydeep Howlader, Vivek Nair and Saikat Basu, National Institute of Technology, india

189

Traffic Signal Control for Isolated Intersections Based on Fuzzy Neural Network and Genetic Algorithm
Tahere. Royani, Javad. Haddadnia and Mohammad. Alipoor, Tarbiat Moallem University of Sabzevar, Iran

191

Author Identification in e-mail Forensic through Service Oriented Architecture
Pushpendra Kumar Pateriya, Shivani Mishra, and Shefalika Ghosh Samaddar, CSED Motilal Nehru National Institute of Technology, India

192

Ad Hoc Routing for Bluetooth Using Epidemic Algorithm
V.R.Anitha and A.Sai Suneel, Sree Vidyanikethan Engineering College - Tirupati, India

196

A Chaos Based Approach for improving Non linearity in S Box Design of Symmetric Key Cryptosystems
Jeyamala.C and Subramanyan.B, Thiagarajar College of Engineering, India

197

Implementation of Invisible Digital Watermarking by Embedding Data in Arithmetically Compressed Form into Image using Variable-Length Key
Sabyasachi Samanta1 and Saurabh Dutta2, 1Haldia Institute of Technology, INDIA and 2B. C. Roy Engineering College, india

201

Energy efficient key management for mobile heterogeneous sensor networks
Saber banihashemian, Abbas Ghaemi Bafghi and Mohammad Hossien Yaghmaee, Ferdowsi University of Mashhad (FUM) , Iran

206

Deployable Low Cost Outdoor Aerial Surveillance System
Ashish Tanwer, Muzahid Hussain and Parminder Singh Reel, Thapar University, India

208

Low-cost Autonomous Ground Vehicle for Low Intensity Military Conflict
Ashish Tanwer, Muzahid Hussain and Parminder Singh Reel, Thapar University, India

214

A Proposed method for increase Security in SCADA systems
Mohammad Reza pushideh and javad haddadnia, Tarbiat moallem university of Sabzevar, Iran

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

All Rights Reserved © AIRCC