Logga in

Boumerdassi, Selma

Recent Trends in Network Security and Applications

Boumerdassi, Selma - Recent Trends in Network Security and Applications, e-bok


E-bok, PDF, Adobe DRM-skydd
ISBN: 9783642144783

Skriva utInte tillåtet
Kopiera till urklippInte tillåtet

Table of contents

1. Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks
M. K. Sandhya, K. Murugan

2. Data Security in Local Area Network Based on Fast Encryption Algorithm
G. Ramesh, R. Umarani

3. Fuzzy Rule-Base Based Intrusion Detection System on Application Layer
S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan

4. Trust Models in Wireless Sensor Networks: A Survey
Mohammad Momani

5. Load Balancing in Distributed Web Caching
Tiwari Rajeev, Khan Gulista

6. TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups
D. V. Naga Raju, V. Valli Kumari

7. Image Classification for More Reliable Steganalysis
R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan

8. Security for High-Speed MANs/WANs
C. S. Lamba

9. Behavioral Analysis of Transport Layer Based Hybrid Covert Channel
Koundinya Anjan, Jibi Abraham

10. Efficient Encryption of Intra and Inter Frames in MPEG Video
V. Vijayalakshmi, L. M. Varalakshmi, G. F. Sudha

11. VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512
R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, V. Vaidehi

12. Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks
N. Bhalaji, P. Gurunathan, A. Shanmugam

13. A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks
N. Bhalaji, A. Shanmugam

14. Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks
T. Subashri, B. Gokul Vinoth Kumar, V. Vaidehi

15. Wireless Mesh Networks: Routing Protocols and Challenges
Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru

16. Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Muttukrishnan Rajarajan, Andrea Zisman

17. Secured Paradigm for Mobile Databases
D. Roselin Selvarani

18. Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks
R. Kayalvizhi, M. Vijayalakshmi, V. Vaidehi

19. Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET
Poonam, K. Garg, M. Misra

20. A Flow Based Slow and Fast Scan Detection System
N. Muraleedharan, Arun Parmar

21. A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices
Amutha Prabakar Muniyandi, Rajaram Ramasmy, Indurani

22. Concurrent Usage Control Implementation Verification Using the SPIN Model Checker
P. V. Rajkumar, S. K. Ghosh, P. Dasgupta

23. Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory
T. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, V. Vaidehi

24. A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model
P. Bera, Soumya Maity, S. K. Ghosh, Pallab Dasgupta

25. Detection and Classification of DDoS Attacks Using Fuzzy Inference System
T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi

26. Detection and Recognition of File Masquerading for E-mail and Data Security
R. Dhanalakshmi, C. Chellappan

27. Privacy Preserving Mining of Distributed Data Using Steganography
D. Aruna Kumari, K. Raja Sekhar Rao, M. Suman

28. Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme
N. R. Sunitha, B. Bharat Amberker

29. Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks
K. Kumar, J. Nafeesa Begum, V. Sumathy

30. A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept
Prabhat Kumar Tiwary, Niwas Maskey, Suman Khakurel

31. Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise
Ankur Gupta

32. Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks
Niwas Maskey, Gitanjali Sachdeva

33. Privacy Layer for Business Intelligence
Vishal Gupta, Ashutosh Saxena

34. Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm
Narendran Rajagopalan, C. Mala

35. Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing
Mithun Paul, Ashutosh Saxena

36. A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies
Srinivasan Madhan Kumar, Dr. Paul Rodrigues

37. BubbleTrust: A Reliable Trust Management forLarge P2P Networks
Miroslav Novotny, Filip Zavoral

38. Dynamic Policy Adaptation for Collaborative Groups
Madhumita Chatterjee, G. Sivakumar

39. A Deviation Based Outlier Intrusion Detection System
Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, Shruti Bansal

40. Privacy Preserving Ciphertext Policy Attribute Based Encryption
A. Balu, K. Kuppusamy

41. Reliable Timeout Based Commit Protocol
Bharati Harsoor, S. Ramachandram

42. Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)
Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, Ramjee Prasad

43. Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges
Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad

44. Reputation Enhancement in a Trust Management System
Shashi Bhanwar, Seema Bawa

45. A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks
Giovanni Schmid, Francesco Rossi

46. Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks
Natarajan Meghanathan

47. Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
Jyoti Grover, Deepak Kumar, M. Sargurunathan, M. S. Gaur, Vijay Laxmi

48. Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis
Gaurav Kumar Tak, Vaibhav Bhargava

49. Knowledge Base Compound Approach towards Spam Detection
Gaurav Kumar Tak, Shashikala Tapaswi

50. Trust Management Framework for Ubiquitous Applications
N. C. Raghu, M. K. Chaithanya, P. R. L. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat

51. A Hybrid Address Allocation Algorithm for IPv6
Raja Kumar Murugesan, Sureswaran Ramadass

52. Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols
Deepak Dembla, Yogesh Chaba

53. A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network
Jaydip Sen

54. A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
Jaydip Sen

55. Towards Designing Application Specific Trust Treated Model
Farag Azzedin, Sajjad Mahmood

56. Security for Contactless Smart Cards Using Cryptography
Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, Parikshit Mahalle

57. A Novel Approach for Compressed Video Steganography
A. P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P. Amritha

58. Privacy Preserving Data Mining by Cyptography
Anand Sharma, Vibha Ojha

59. A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure
Animesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra

60. Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm
M. Anandhavalli, M. K. Ghose, K. Gauthaman, M. Boosha

61. Design and Implementation of Pessimistic Commit Protocols in Mobile Environments
Salman Abdul Moiz, Lakshmi Rajamani, Supriya N. Pal

62. On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases
Sugam Sharma, Shashi K. Gadia

63. Implementation of MPEG-7 Document Management System Based on Native Database
Byeong-Tae Ahn

Nyckelord: Computer Science, Computer Communication Networks, Information Systems Applications (incl.Internet), Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Data Encryption, Software Engineering

Communications in Computer and Information Science
Datateknik, Datakommunikation

Liknande e-böcker