ISEA-ISAP 2020 Accepted Papers

Deepak K and Chandrasekaran K. Investigating Elliptic Curve Cryptography for Securing Smart Grid Environments
Jakub Klemsa and Ivana Trummova. Security Notions for the VeraGreg Framework and Their Reductions
Upasana Sarmah, Dhruba Kumar Bhattacharyya and Jugal Kalita. XSSD: A Cross-site Scripting Attack Dataset and its Evaluation
Kalaiarasi M, Venkatasubramani Vr and Rajaram Sivasubramanian. Parallel Itoh-Tsujii inversion Algorithm for FPGA Platforms
Sivaraman R, Hemanth Kumar Nalajala, Amirtharajan Rengarajan and Sundararaman Rajagopalan. Beat Frequency Detection on Boolean Chaotic Oscillator for True Random Number Generation on FPGA
Hardik Gajera and Manik Lal Das. DeDOP: Deduplication with cross-server Ownership over encrypted data
Suman Nandi, Santanu Phadikar and Koushik Majumder. Detection of DDoS Attack and Classification Using a Hybrid Approach
Kausthav Pratim Kalita, Debojit Boro and Dhruba Kumar Bhattacharyya. Implementation of Minimally Shared Blockchains using Big Data Applications
Hiten Choudhury. Enhanced Anonymity: Customized for Roaming and Non-Roaming IoT-Devices in 5G Mobile Network
Apurva Kittur, Swapnil Kauthale and Alwyn Pais. A LDPC codes based Authentication Scheme
Vineeta Jain, Divya Rishi Sahu and Deepak Singh Tomar. AN APPROACH TO IDENTIFY VULNERABLE FEATURES OF INSTANT MESSENGER
Navarikuth Muraleedharan, Anna Thomas, S Indu and B S Bindhumadhava. A Traffic Monitoring and Policy Enforcement Framework for HTTP
Amalan Joseph Antony A and Kunwar Singh. Enhancing Privacy in a Blockchain-based Public Key Infrastructure
Oruganti Sai Srujana, Nikhil Mhala and Alwyn Pais. Secure transmission of Hyperspectral Images
Tejendrakumar Thakur and Ningrinla Marchang. Provisioning Privacy and Accountability in Participatory Sensing
Jiji Angel and Virendra Singh. On The DSA Key Recovery Attack with Variable Partial Nonces Known
Thockchom Birjit Singha, Roy Paily Palathinkal and Shaik Rafi Ahamed. Implementation of AES Using Composite Field Arithmetic for IoT Applications
Ashok Kumar, Ranjani Parthasarthi and Vetriselvi V. Security Testbed for Next Generation Mobile Networks
Meghali Nandi, Rajat Kanti Bhattacharjee, Amrit Jha and Ferdous Ahmed Barbhuiya. A secured land registration framework on Blockchain
Ram Charan Baishya and Dhruba Bhattacharyya. Singleton Flow Traceback (SFT) Mechanism
Vikash Kumar Rai, Somanath Tripathy and Jimson Mathew. 2SPUF: Machine Learning Attack Resistant SRAM PUF
Nandit Kaushik and Kusum Lata. An Approach Towards Resisting Side-Channel Attacks for Secured Testing of Advanced Encryption Algorithm (AES) Cryptochip
Teenu John, Tony Thomas and Sabu Emmanuel. Graph Convolutional Nets for Android Malware Detection with System Call Graphs
Raghavendra K M and Kiran Manjappa. Inter-Planetary File System Enabled Blockchain Solution For Securing Healthcare Records