​
Login / Signup
CNSA
2010
2010
2010
Keyphrases
Publications
2010
N. Bhalaji
,
P. Gurunathan
,
A. Shanmugam
Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks.
CNSA
(2010)
Vikas Pareek
,
Aditi Mishra
,
Arpana Sharma
,
Rashmi Chauhan
,
Shruti Bansal
A Deviation Based Outlier Intrusion Detection System.
CNSA
(2010)
Animesh Tripathy
,
Subhalaxmi Das
,
Prashanta Kumar Patra
A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure.
CNSA
(2010)
Miroslav Novotný
,
Filip Zavoral
BubbleTrust: A Reliable Trust Management for Large P2P Networks.
CNSA
(2010)
V. Vijayalakshmi
,
L. M. Varalakshmi
,
G. Florence Sudha
Efficient Encryption of Intra and Inter Frames in MPEG Video.
CNSA
(2010)
Krishnan Kumar
,
J. Nafeesa Begum
,
V. Sumathy
Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks.
CNSA
(2010)
Tiwari Rajeev
,
Khan Gulista
Load Balancing in Distributed Web Caching.
CNSA
(2010)
Anand Sharma
,
Vibha Ojha
Privacy Preserving Data Mining by Cyptography.
CNSA
(2010)
R. Kayalvizhi
,
M. Vijayalakshmi
,
Vaidehi V.
Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks.
CNSA
(2010)
C. S. Lamba
Security for High-Speed MANs/WANs.
CNSA
(2010)
G. Ramesh
,
R. Umarani
Data Security in Local Area Network Based on Fast Encryption Algorithm.
CNSA
(2010)
Jaydip Sen
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks.
CNSA
(2010)
Gaurav Kumar Tak
,
Shashikala Tapaswi
Knowledge Base Compound Approach towards Spam Detection.
CNSA
(2010)
Raja Kumar Murugesan
,
Sureswaran Ramadass
A Hybrid Address Allocation Algorithm for IPv6.
CNSA
(2010)
Deepak Dembla
,
Yogesh Chaba
Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols.
CNSA
(2010)
D. V. Naga Raju
,
V. Valli Kumari
TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups.
CNSA
(2010)
N. Bhalaji
,
A. Shanmugam
A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks.
CNSA
(2010)
Sachin Babar
,
Parikshit Mahalle
,
Antonietta Stango
,
Neeli R. Prasad
,
Ramjee Prasad
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT).
CNSA
(2010)
Madhumita Chatterjee
,
G. Sivakumar
Dynamic Policy Adaptation for Collaborative Groups.
CNSA
(2010)
Mithun Paul
,
Ashutosh Saxena
Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing.
CNSA
(2010)
Shashi Bhanwar
,
Seema Bawa
Reputation Enhancement in a Trust Management System.
CNSA
(2010)
Anuj Kundarap
,
Arpit Chhajlani
,
Rashu Singla
,
Mugdha Sawant
,
Milind Dere
,
Parikshit Mahalle
Security for Contactless Smart Cards Using Cryptography.
CNSA
(2010)
Jyoti Grover
,
Deepak Kumar
,
M. Sargurunathan
,
Manoj Singh Gaur
,
Vijay Laxmi
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks.
CNSA
(2010)
Madhan Kumar Srinivasan
,
Paul Rodrigues
A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies.
CNSA
(2010)
P. V. Rajkumar
,
Soumya Kanti Ghosh
,
Pallab Dasgupta
Concurrent Usage Control Implementation Verification Using the SPIN Model Checker.
CNSA
(2010)
S. Sangeetha
,
S. Haripriya
,
S. G. Mohana Priya
,
Vaidehi V.
,
N. Srinivasan
Fuzzy Rule-Base Based Intrusion Detection System on Application Layer.
CNSA
(2010)
D. Aruna Kumari
,
K. Raja Sekhar Rao
,
M. Suman
Privacy Preserving Mining of Distributed Data Using Steganography.
CNSA
(2010)
Parikshit Mahalle
,
Sachin Babar
,
Neeli R. Prasad
,
Ramjee Prasad
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges.
CNSA
(2010)
Bharati Harsoor
,
Sumalatha Ramachandram
Reliable Timeout Based Commit Protocol.
CNSA
(2010)
Ranaganayakulu Dhanalakshmi
,
Chenniappan Chellappan
Detection and Recognition of File Masquerading for E-mail and Data Security.
CNSA
(2010)
Prabhat Kumar Tiwary
,
Niwas Maskey
,
Suman Khakurel
A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept.
CNSA
(2010)
Mohammad Momani
Trust Models in Wireless Sensor Networks: A Survey.
CNSA
(2010)
Vishal Gupta
,
Ashutosh Saxena
Privacy Layer for Business Intelligence.
CNSA
(2010)
D. Roselin Selvarani
Secured Paradigm for Mobile Databases.
CNSA
(2010)
A. Balu
,
Kuppusamy Krishnamoorthy
Privacy Preserving Ciphertext Policy Attribute Based Encryption.
CNSA
(2010)
N. Muraleedharan
,
Arun Parmar
A Flow Based Slow and Fast Scan Detection System.
CNSA
(2010)
R. Kayalvizhi
,
R. Harihara Subramanian
,
R. Girish Santhosh
,
J. Gurubaran
,
Vaidehi V.
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512.
CNSA
(2010)
Sugam Sharma
,
Shashi K. Gadia
On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases.
CNSA
(2010)
Poonam Gera
,
Kumkum Garg
,
Manoj Misra
Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET.
CNSA
(2010)
Anjan K. Koundinya
,
Jibi Abraham
Behavioral Analysis of Transport Layer Based Hybrid Covert Channel.
CNSA
(2010)
Jaydip Sen
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network.
CNSA
(2010)
Niwas Maskey
,
Gitanjali Sachdeva
Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks.
CNSA
(2010)
Natarajan Meghanathan
Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks.
CNSA
(2010)
T. Subbulakshmi
,
S. Mercy Shalinie
,
C. Suneel Reddy
,
A. Ramamoorthi
Detection and Classification of DDoS Attacks Using Fuzzy Inference System.
CNSA
(2010)
Amutha Prabakar Muniyandi
,
Rajaram Ramasamy
,
Indurani
A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices.
CNSA
(2010)
Giovanni Schmid
,
Francesco Rossi
A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks.
CNSA
(2010)
Salman Abdul Moiz
,
Lakshmi Rajamani
,
Supriya N. Pal
Design and Implementation of Pessimistic Commit Protocols in Mobile Environments.
CNSA
(2010)
Pavan Kumar Ponnapalli
,
Ramesh Babu Battula
,
Pavan Kumar Tummala
,
Srikanth Vemuru
Wireless Mesh Networks: Routing Protocols and Challenges.
CNSA
(2010)
T. Subashri
,
R. Arunachalam
,
B. Gokul Vinoth Kumar
,
Vaidehi V.
Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory.
CNSA
(2010)
volume 89, 2010
Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings
CNSA
89 (2010)