Boumerdassi, Selma
Recent Trends in Network Security and Applications
1. Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks
M. K. Sandhya, K. Murugan
2. Data Security in Local Area Network Based on Fast Encryption Algorithm
G. Ramesh, R. Umarani
3. Fuzzy Rule-Base Based Intrusion Detection System on Application Layer
S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan
4. Trust Models in Wireless Sensor Networks: A Survey
Mohammad Momani
5. Load Balancing in Distributed Web Caching
Tiwari Rajeev, Khan Gulista
6. TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups
D. V. Naga Raju, V. Valli Kumari
7. Image Classification for More Reliable Steganalysis
R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan
8. Security for High-Speed MANs/WANs
C. S. Lamba
9. Behavioral Analysis of Transport Layer Based Hybrid Covert Channel
Koundinya Anjan, Jibi Abraham
10. Efficient Encryption of Intra and Inter Frames in MPEG Video
V. Vijayalakshmi, L. M. Varalakshmi, G. F. Sudha
11. VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512
R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, V. Vaidehi
12. Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks
N. Bhalaji, P. Gurunathan, A. Shanmugam
13. A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks
N. Bhalaji, A. Shanmugam
14. Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks
T. Subashri, B. Gokul Vinoth Kumar, V. Vaidehi
15. Wireless Mesh Networks: Routing Protocols and Challenges
Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru
16. Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Muttukrishnan Rajarajan, Andrea Zisman
17. Secured Paradigm for Mobile Databases
D. Roselin Selvarani
18. Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks
R. Kayalvizhi, M. Vijayalakshmi, V. Vaidehi
19. Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET
Poonam, K. Garg, M. Misra
20. A Flow Based Slow and Fast Scan Detection System
N. Muraleedharan, Arun Parmar
21. A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices
Amutha Prabakar Muniyandi, Rajaram Ramasmy, Indurani
22. Concurrent Usage Control Implementation Verification Using the SPIN Model Checker
P. V. Rajkumar, S. K. Ghosh, P. Dasgupta
23. Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory
T. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, V. Vaidehi
24. A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model
P. Bera, Soumya Maity, S. K. Ghosh, Pallab Dasgupta
25. Detection and Classification of DDoS Attacks Using Fuzzy Inference System
T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi
26. Detection and Recognition of File Masquerading for E-mail and Data Security
R. Dhanalakshmi, C. Chellappan
27. Privacy Preserving Mining of Distributed Data Using Steganography
D. Aruna Kumari, K. Raja Sekhar Rao, M. Suman
28. Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme
N. R. Sunitha, B. Bharat Amberker
29. Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks
K. Kumar, J. Nafeesa Begum, V. Sumathy
30. A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept
Prabhat Kumar Tiwary, Niwas Maskey, Suman Khakurel
31. Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise
Ankur Gupta
32. Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks
Niwas Maskey, Gitanjali Sachdeva
33. Privacy Layer for Business Intelligence
Vishal Gupta, Ashutosh Saxena
34. Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm
Narendran Rajagopalan, C. Mala
35. Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing
Mithun Paul, Ashutosh Saxena
36. A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies
Srinivasan Madhan Kumar, Dr. Paul Rodrigues
37. BubbleTrust: A Reliable Trust Management forLarge P2P Networks
Miroslav Novotny, Filip Zavoral
38. Dynamic Policy Adaptation for Collaborative Groups
Madhumita Chatterjee, G. Sivakumar
39. A Deviation Based Outlier Intrusion Detection System
Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, Shruti Bansal
40. Privacy Preserving Ciphertext Policy Attribute Based Encryption
A. Balu, K. Kuppusamy
41. Reliable Timeout Based Commit Protocol
Bharati Harsoor, S. Ramachandram
42. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, Ramjee Prasad
43. Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges
Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad
44. Reputation Enhancement in a Trust Management System
Shashi Bhanwar, Seema Bawa
45. A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks
Giovanni Schmid, Francesco Rossi
46. Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks
Natarajan Meghanathan
47. Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
Jyoti Grover, Deepak Kumar, M. Sargurunathan, M. S. Gaur, Vijay Laxmi
48. Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis
Gaurav Kumar Tak, Vaibhav Bhargava
49. Knowledge Base Compound Approach towards Spam Detection
Gaurav Kumar Tak, Shashikala Tapaswi
50. Trust Management Framework for Ubiquitous Applications
N. C. Raghu, M. K. Chaithanya, P. R. L. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat
51. A Hybrid Address Allocation Algorithm for IPv6
Raja Kumar Murugesan, Sureswaran Ramadass
52. Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols
Deepak Dembla, Yogesh Chaba
53. A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network
Jaydip Sen
54. A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
Jaydip Sen
55. Towards Designing Application Specific Trust Treated Model
Farag Azzedin, Sajjad Mahmood
56. Security for Contactless Smart Cards Using Cryptography
Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, Parikshit Mahalle
57. A Novel Approach for Compressed Video Steganography
A. P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P. Amritha
58. Privacy Preserving Data Mining by Cyptography
Anand Sharma, Vibha Ojha
59. A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure
Animesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra
60. Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm
M. Anandhavalli, M. K. Ghose, K. Gauthaman, M. Boosha
61. Design and Implementation of Pessimistic Commit Protocols in Mobile Environments
Salman Abdul Moiz, Lakshmi Rajamani, Supriya N. Pal
62. On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases
Sugam Sharma, Shashi K. Gadia
63. Implementation of MPEG-7 Document Management System Based on Native Database
Byeong-Tae Ahn
Keywords: Computer Science, Computer Communication Networks, Information Systems Applications (incl.Internet), Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Data Encryption, Software Engineering
- Author(s)
- Boumerdassi, Selma
- Chaki, Nabendu
- Meghanathan, Natarajan
- Nagamalai, Dhinaharan
- Publisher
- Springer
- Publication year
- 2010
- Language
- en
- Edition
- 1
- Series
- Communications in Computer and Information Science
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783642144783