Recent Trends in Network Security and Applications (Record no. 112484)

000 -LEADER
fixed length control field 07562nam a22005895i 4500
001 - CONTROL NUMBER
control field 978-3-642-14478-3
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140220084542.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100723s2010 gw | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783642144783
-- 978-3-642-14478-3
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-642-14478-3
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.5-5105.9
072 #7 - SUBJECT CATEGORY CODE
Subject category code UKN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM075000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Meghanathan, Natarajan.
Relator term editor.
245 10 - TITLE STATEMENT
Title Recent Trends in Network Security and Applications
Medium [electronic resource] :
Remainder of title Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings /
Statement of responsibility, etc edited by Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai.
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2010.
300 ## - PHYSICAL DESCRIPTION
Extent 651p. 286 illus.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Communications in Computer and Information Science,
International Standard Serial Number 1865-0929 ;
Volume number/sequential designation 89
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note The Third International Conference on Network Security and Applications (CNSA 2010) -- Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks -- Data Security in Local Area Network Based on Fast Encryption Algorithm -- Fuzzy Rule-Base Based Intrusion Detection System on Application Layer -- Trust Models in Wireless Sensor Networks: A Survey -- Load Balancing in Distributed Web Caching -- TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups -- Image Classification for More Reliable Steganalysis -- Security for High-Speed MANs/WANs -- Behavioral Analysis of Transport Layer Based Hybrid Covert Channel -- Efficient Encryption of Intra and Inter Frames in MPEG Video -- VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 -- Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks -- A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks -- Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks -- Wireless Mesh Networks: Routing Protocols and Challenges -- Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification -- Secured Paradigm for Mobile Databases -- Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks -- Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET -- A Flow Based Slow and Fast Scan Detection System -- A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices -- Concurrent Usage Control Implementation Verification Using the SPIN Model Checker -- Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory -- A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model -- Detection and Classification of DDoS Attacks Using Fuzzy Inference System -- Detection and Recognition of File Masquerading for E-mail and Data Security -- Privacy Preserving Mining of Distributed Data Using Steganography -- First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P -- Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme -- Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks -- A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept -- Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise -- Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks -- Privacy Layer for Business Intelligence -- Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm -- Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing -- A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies -- BubbleTrust: A Reliable Trust Management for Large P2P Networks -- Dynamic Policy Adaptation for Collaborative Groups -- A Deviation Based Outlier Intrusion Detection System -- Privacy Preserving Ciphertext Policy Attribute Based Encryption -- Reliable Timeout Based Commit Protocol -- Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) -- Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges -- Reputation Enhancement in a Trust Management System -- A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks -- Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks -- Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks -- Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis -- Knowledge Base Compound Approach towards Spam Detection -- Trust Management Framework for Ubiquitous Applications -- A Hybrid Address Allocation Algorithm for IPv6 -- Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols -- A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network -- A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks -- Towards Designing Application Specific Trust Treated Model -- First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010 -- Security for Contactless Smart Cards Using Cryptography -- A Novel Approach for Compressed Video Steganography -- Privacy Preserving Data Mining by Cyptography -- A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure -- Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm -- Design and Implementation of Pessimistic Commit Protocols in Mobile Environments -- On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases -- Implementation of MPEG-7 Document Management System Based on Native Database.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the proceedings of the Third International Conference on Network Security and Applications held in Chennai, India, in July 2010.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Software engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information systems.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information Systems Applications (incl.Internet).
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Management of Computing and Information Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Software Engineering.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Boumerdassi, Selma.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chaki, Nabendu.
Relator term editor.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nagamalai, Dhinaharan.
Relator term editor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783642144776
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Communications in Computer and Information Science,
-- 1865-0929 ;
Volume number/sequential designation 89
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-642-14478-3
912 ## -
-- ZDB-2-SCS

No items available.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue