default search action
CNSA 2010: Chennai, India
- Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai:
Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings. Communications in Computer and Information Science 89, Springer 2010, ISBN 978-3-642-14477-6
Part 1 / The Third International Conference on Network Security and Applications (CNSA 2010)
- M. K. Sandhya, Krishnan Murugan:
Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks. 1-10 - G. Ramesh, R. Umarani:
Data Security in Local Area Network Based on Fast Encryption Algorithm. 11-26 - S. Sangeetha, S. Haripriya, S. G. Mohana Priya, Vaidehi V., N. Srinivasan:
Fuzzy Rule-Base Based Intrusion Detection System on Application Layer. 27-36 - Mohammad Momani:
Trust Models in Wireless Sensor Networks: A Survey. 37-46 - Rajeev Tiwari, Gulista Khan:
Load Balancing in Distributed Web Caching. 47-54 - D. V. Naga Raju, V. Valli Kumari:
TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups. 55-65 - R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan:
Image Classification for More Reliable Steganalysis. 66-74 - C. S. Lamba:
Security for High-Speed MANs/WANs. 75-82 - Anjan K. Koundinya, Jibi Abraham:
Behavioral Analysis of Transport Layer Based Hybrid Covert Channel. 83-92 - V. Vijayalakshmi, L. M. Varalakshmi, G. Florence Sudha:
Efficient Encryption of Intra and Inter Frames in MPEG Video. 93-104 - R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, Vaidehi V.:
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512. 105-113 - N. Bhalaji, P. Gurunathan, A. Shanmugam:
Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks. 114-122 - N. Bhalaji, A. Shanmugam:
A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks. 123-131 - T. Subashri, B. Gokul Vinoth Kumar, Vaidehi V.:
Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks. 132-142 - Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru:
Wireless Mesh Networks: Routing Protocols and Challenges. 143-151 - Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Muttukrishnan Rajarajan, Andrea Zisman:
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification. 152-163 - D. Roselin Selvarani:
Secured Paradigm for Mobile Databases. 164-171 - R. Kayalvizhi, M. Vijayalakshmi, Vaidehi V.:
Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks. 172-180 - Poonam Gera, Kumkum Garg, Manoj Misra:
Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET. 181-190 - N. Muraleedharan, Arun Parmar:
A Flow Based Slow and Fast Scan Detection System. 191-200 - Amutha Prabakar Muniyandi, Rajaram Ramasamy, Indurani:
A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices. 201-213 - P. V. Rajkumar, Soumya Kanti Ghosh, Pallab Dasgupta:
Concurrent Usage Control Implementation Verification Using the SPIN Model Checker. 214-223 - T. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, Vaidehi V.:
Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory. 224-231 - Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh, Pallab Dasgupta:
A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model. 232-241 - T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi:
Detection and Classification of DDoS Attacks Using Fuzzy Inference System. 242-252 - Ranaganayakulu Dhanalakshmi, Chenniappan Chellappan:
Detection and Recognition of File Masquerading for E-mail and Data Security. 253-262 - D. Aruna Kumari, K. Raja Sekhar Rao, M. Suman:
Privacy Preserving Mining of Distributed Data Using Steganography. 263-269
Part 2 / First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P
- N. R. Sunitha, B. B. Amberker:
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme. 270-279 - Krishnan Kumar, J. Nafeesa Begum, V. Sumathy:
Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks. 280-295 - Prabhat Kumar Tiwary, Niwas Maskey, Suman Khakurel:
A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept. 296-301 - Ankur Gupta:
Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise. 302-313 - Niwas Maskey, Gitanjali Sachdeva:
Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks. 314-322 - Vishal Gupta, Ashutosh Saxena:
Privacy Layer for Business Intelligence. 323-330 - Narendran Rajagopalan, C. Mala:
Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm. 331-339 - Mithun Paul, Ashutosh Saxena:
Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing. 340-348 - Madhan Kumar Srinivasan, Paul Rodrigues:
A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies. 349-358 - Miroslav Novotný, Filip Zavoral:
BubbleTrust: A Reliable Trust Management for Large P2P Networks. 359-373 - Madhumita Chatterjee, G. Sivakumar:
Dynamic Policy Adaptation for Collaborative Groups. 374-394 - Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, Shruti Bansal:
A Deviation Based Outlier Intrusion Detection System. 395-401 - A. Balu, Kuppusamy Krishnamoorthy:
Privacy Preserving Ciphertext Policy Attribute Based Encryption. 402-409 - Bharati Harsoor, Sumalatha Ramachandram:
Reliable Timeout Based Commit Protocol. 410-419 - Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli R. Prasad, Ramjee Prasad:
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). 420-429 - Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad:
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. 430-439 - Shashi Bhanwar, Seema Bawa:
Reputation Enhancement in a Trust Management System. 440-451 - Giovanni Schmid, Francesco Rossi:
A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks. 452-462 - Natarajan Meghanathan:
Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks. 463-472 - Jyoti Grover, Deepak Kumar, M. Sargurunathan, Manoj Singh Gaur, Vijay Laxmi:
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. 473-482 - Gaurav Kumar Tak, Vaibhav Bhargava:
Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis. 483-489 - Gaurav Kumar Tak, Shashikala Tapaswi:
Knowledge Base Compound Approach towards Spam Detection. 490-499 - N. C. Raghu, M. K. Chaithanya, P. R. L. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat:
Trust Management Framework for Ubiquitous Applications. 500-508 - Raja Kumar Murugesan, Sureswaran Ramadass:
A Hybrid Address Allocation Algorithm for IPv6. 509-517 - Deepak Dembla, Yogesh Chaba:
Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols. 518-527 - Jaydip Sen:
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network. 528-537 - Jaydip Sen:
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks. 538-547 - Farag Azzedin, Sajjad Mahmood:
Towards Designing Application Specific Trust Treated Model. 548-557
Part 3 / First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010
- Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, Parikshit Mahalle:
Security for Contactless Smart Cards Using Cryptography. 558-566 - A. P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P. Amritha:
A Novel Approach for Compressed Video Steganography. 567-575 - Anand Sharma, Vibha Ojha:
Privacy Preserving Data Mining by Cyptography. 576-582 - Animesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra:
A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure. 583-592 - M. Anandhavalli, Mrinal Kanti Ghose, K. Gauthaman, M. Boosha:
Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm. 593-602 - Salman Abdul Moiz, Lakshmi Rajamani, Supriya N. Pal:
Design and Implementation of Pessimistic Commit Protocols in Mobile Environments. 603-612 - Sugam Sharma, Shashi K. Gadia:
On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases. 613-624 - Byeong-Tae Ahn:
Implementation of MPEG-7 Document Management System Based on Native Database. 625-634
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.