1 : Deniable authentication Sumit Somani sumitsomani@iitb.ac.in Gaurav Malpani z7005011@iitb.ac.in Mayank Singhal mayank.singhal@iitb.ac.in Raman Sharma raman_sharma@iitb.ac.in Adhip Agarwal adhipagarwal@iitb.ac.in 2 : ******Topic not submitted******* Nisarg Shah nisarg@cse.iitb.ac.in Siddharth Dhakad siddharthdhakad@cse.iitb.ac.in Ankush Bajoria ankush@cse.iitb.ac.in Chirag Sethi chiragsethi@cse.iitb.ac.in Dileep Kini dileep@cse.iitb.ac.in 3 : Wormhole attack in wireless networks PATANI JEET RUSHIKESH jeetpatani@cse.iitb.ac.in SHAH ANKIT RAJESH ankitrshah@cse.iitb.ac.in MANVAR DHAVAL RAMESHBHAI manvardhaval@cse.iitb.ac.in SHAH SWAPNIL DEVENDRAKUMAR swapnilshah@cse.iitb.ac.in KALARIA NIMIT DINESHBHAI nimit@cse.iitb.ac.in 4 : Anti-Phishing Kaustubh Keskar kaustubh@cse.iitb.ac.in Nitin Satpal nitinsatpal@cse.iitb.ac.in Deepak Jayanth deejay@cse.iitb.ac.in Ram Prasad Pangeni rampangeni@cse.iitb.ac.in Vijaykumar Agnihotri agni@cse.iitb.ac.in 5 : Demo of XSS LALIT KUMAR lalitkumar@cse.iitb.ac.in KANAPATA SUDHAKARA RAO sudhakar@cse.iitb.ac.in MOHANA SURYA BALAJI MAJJI balajimms@cse.iitb.ac.in Pratik Patodi pratik.patodi01@gmail.com POTHULA RAJ DEEPAK rajdeepak@cse.iitb.ac.in 6 : Steganography and steganalysis Akash Singhal akash@cse.iitb.ac.in Naval Chopra navalchopra@cse.iitb.ac.in Ajay Singh Meena ajaysmeena@cse.iitb.ac.in Abhimanyu Dhamija abhimanyu@cse.iitb.ac.in M Yashoteja Prabhu yashoteja@cse.iitb.ac.in 7 : Demo of spyware Harsh Vardhan harsh@cse.iitb.ac.in Raja Sekhar mraju@cse.iitb.ac.in M Nikhil nikhil@cse.iitb.ac.in Naga Srinivas srimeruva@cse.iitb.ac.in Vishnu tvishnu@cse.iitb.ac.in 8 : Demo of XSS Manisha Ambekar amanisha@cse.iitb.ac.in Subhajit Datta subbo@cse.iitb.ac.in Prajakta Ayachit prajaktaa@cse.iitb.ac.in Chinmay Vaishampayan chinmay@cse.iitb.ac.in Rupesh Bende rbbende@cse.iitb.ac.in 9 : Analysis of Mandatory Access Control on Linux Abhishek Sagar abhisheks@cse.iitb.ac.in Manjeet Singh Pangtey manjeet@cse.iitb.ac.in Umang kumar umang@cse.iitb.ac.in Vishal Negi vishalng@cse.iitb.ac.in Chandra Pal Singh cpsingh@cse.iitb.ac.in 10 : Demo of XSS ATUL MITTAL atulmittal@cse.iitb.ac.in ANKIT SHAH ankitshah@cse.iitb.ac.in TARUN AGRAWAL tarun@cse.iitb.ac.in SAMPREET SHARMA A sampreet@cse.iitb.ac.in SARADE SHRIPAD SHARAD shripadsarade@cse.iitb.ac.in 11 : XSS prevention Abhilash Sahu abhilashsahu@cse.iitb.ac.in Ravi Shankar ravishankar@cse.iitb.ac.in Vikash Kumar vikashk@cse.iitb.ac.in Gyanaranjan Shial gyanaranjan@cse.iitb.ac.in Prashant Jaiswal prashantj@cse.iitb.ac.in 12 : ******* Topic Not submitted ******* Praveen Kumar praveendhanala@iitb.ac.in Vinod Bhadavat bvinodkumar@iitb.ac.in Pradeep Kumar pradeep_iitb@iitb.ac.in Hrudil Gorantla hrudil@iitb.ac.in Sudheer Kumar kumar_@iitb.ac.in 13 : Secured Image Based Authentication System Using An Optimized Kerberos Authentication Protocol Arpit Malani malaniarpit@cse.iitb.ac.in RAHUL NIHALANI rahuln@cse.iitb.ac.in DHANAVATH SAIDA saidanaik@cse.iitb.ac.in NAGA MANOJ VANKADHARA nagamanojv@cse.iitb.ac.in Sandra Nickel 10v05102@iitb.ac.in 14 : Cost-effectiveness of symetric key algorithms for small amounts of data jayant ameta jayantameta@iitb.ac.in Nitin Kumar Gautam gautamnitin@cse.iitb.ac.in Mayur Mahrotri mayurma@cse.iitb.ac.in Pankaj Kumar pankajcse@cse.iitb.ac.in Mihir Gokani mihirgokani@cse.iitb.ac.in Sangita Zope 10431801@iitb.ac.in 15 : Demo of various attacks ( XSS,SQL Injection,Phishing) Rami Reddy pvrreddy@cse.iitb.ac.in Krishna Teja krishnateja@cse.iitb.ac.in Linga Venkatesh linga@cse.iitb.ac.in Rajesh Kaushik rajkaushik@cse.iitb.ac.in Advait Raut amraut@cse.iitb.ac.in 16 : Implementation of public and secret key cryptography munish minia munishminia@iitb.ac.in priyank sharma priyanksharma@iitb.ac.in vaibhav chhimpa chhimpa_vaibhav@iitb.ac.in abhishek kumar abhishek.cse.iitb@iitb.ac.in