000 07562nam a22005895i 4500
001 978-3-642-14478-3
003 DE-He213
005 20140220084542.0
007 cr nn 008mamaa
008 100723s2010 gw | s |||| 0|eng d
020 _a9783642144783
_9978-3-642-14478-3
024 7 _a10.1007/978-3-642-14478-3
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
100 1 _aMeghanathan, Natarajan.
_eeditor.
245 1 0 _aRecent Trends in Network Security and Applications
_h[electronic resource] :
_bThird International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings /
_cedited by Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _a651p. 286 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v89
505 0 _aThe Third International Conference on Network Security and Applications (CNSA 2010) -- Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks -- Data Security in Local Area Network Based on Fast Encryption Algorithm -- Fuzzy Rule-Base Based Intrusion Detection System on Application Layer -- Trust Models in Wireless Sensor Networks: A Survey -- Load Balancing in Distributed Web Caching -- TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups -- Image Classification for More Reliable Steganalysis -- Security for High-Speed MANs/WANs -- Behavioral Analysis of Transport Layer Based Hybrid Covert Channel -- Efficient Encryption of Intra and Inter Frames in MPEG Video -- VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 -- Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks -- A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks -- Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks -- Wireless Mesh Networks: Routing Protocols and Challenges -- Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification -- Secured Paradigm for Mobile Databases -- Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks -- Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET -- A Flow Based Slow and Fast Scan Detection System -- A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices -- Concurrent Usage Control Implementation Verification Using the SPIN Model Checker -- Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory -- A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model -- Detection and Classification of DDoS Attacks Using Fuzzy Inference System -- Detection and Recognition of File Masquerading for E-mail and Data Security -- Privacy Preserving Mining of Distributed Data Using Steganography -- First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P -- Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme -- Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks -- A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept -- Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise -- Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks -- Privacy Layer for Business Intelligence -- Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm -- Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing -- A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies -- BubbleTrust: A Reliable Trust Management for Large P2P Networks -- Dynamic Policy Adaptation for Collaborative Groups -- A Deviation Based Outlier Intrusion Detection System -- Privacy Preserving Ciphertext Policy Attribute Based Encryption -- Reliable Timeout Based Commit Protocol -- Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) -- Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges -- Reputation Enhancement in a Trust Management System -- A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks -- Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks -- Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks -- Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis -- Knowledge Base Compound Approach towards Spam Detection -- Trust Management Framework for Ubiquitous Applications -- A Hybrid Address Allocation Algorithm for IPv6 -- Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols -- A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network -- A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks -- Towards Designing Application Specific Trust Treated Model -- First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010 -- Security for Contactless Smart Cards Using Cryptography -- A Novel Approach for Compressed Video Steganography -- Privacy Preserving Data Mining by Cyptography -- A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure -- Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm -- Design and Implementation of Pessimistic Commit Protocols in Mobile Environments -- On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases -- Implementation of MPEG-7 Document Management System Based on Native Database.
520 _aThis book constitutes the proceedings of the Third International Conference on Network Security and Applications held in Chennai, India, in July 2010.
650 0 _aComputer science.
650 0 _aComputer Communication Networks.
650 0 _aSoftware engineering.
650 0 _aData encryption (Computer science).
650 0 _aComputer software.
650 0 _aInformation systems.
650 0 _aInformation Systems.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems Applications (incl.Internet).
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aData Encryption.
650 2 4 _aSoftware Engineering.
700 1 _aBoumerdassi, Selma.
_eeditor.
700 1 _aChaki, Nabendu.
_eeditor.
700 1 _aNagamalai, Dhinaharan.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783642144776
830 0 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v89
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-14478-3
912 _aZDB-2-SCS
999 _c112484
_d112484