Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Giovanni Schmid, Francesco Rossi |
A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jaydip Sen |
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Salman Abdul Moiz, Lakshmi Rajamani, Supriya N. Pal |
Design and Implementation of Pessimistic Commit Protocols in Mobile Environments. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vishal Gupta, Ashutosh Saxena |
Privacy Layer for Business Intelligence. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli R. Prasad, Ramjee Prasad |
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, Parikshit Mahalle |
Security for Contactless Smart Cards Using Cryptography. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru |
Wireless Mesh Networks: Routing Protocols and Challenges. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bharati Harsoor, Sumalatha Ramachandram |
Reliable Timeout Based Commit Protocol. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raja Kumar Murugesan, Sureswaran Ramadass |
A Hybrid Address Allocation Algorithm for IPv6. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, Vaidehi V. |
VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rajeev Tiwari, Gulista Khan |
Load Balancing in Distributed Web Caching. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Amutha Prabakar Muniyandi, Rajaram Ramasamy, Indurani |
A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Anand Sharma, Vibha Ojha |
Privacy Preserving Data Mining by Cyptography. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jyoti Grover, Deepak Kumar, M. Sargurunathan, Manoj Singh Gaur, Vijay Laxmi |
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | T. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, Vaidehi V. |
Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | D. Aruna Kumari, K. Raja Sekhar Rao, M. Suman |
Privacy Preserving Mining of Distributed Data Using Steganography. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jaydip Sen |
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Prabhat Kumar Tiwary, Niwas Maskey, Suman Khakurel |
A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | V. Vijayalakshmi, L. M. Varalakshmi, G. Florence Sudha |
Efficient Encryption of Intra and Inter Frames in MPEG Video. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | A. Balu, Kuppusamy Krishnamoorthy |
Privacy Preserving Ciphertext Policy Attribute Based Encryption. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | D. V. Naga Raju, V. Valli Kumari |
TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Poonam Gera, Kumkum Garg, Manoj Misra |
Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | N. Bhalaji 0001, P. Gurunathan, A. Shanmugam |
Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Natarajan Meghanathan |
Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mithun Paul, Ashutosh Saxena |
Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shashi Bhanwar, Seema Bawa |
Reputation Enhancement in a Trust Management System. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | C. S. Lamba |
Security for High-Speed MANs/WANs. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Madhan Kumar Srinivasan, Paul Rodrigues 0002 |
A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | P. V. Rajkumar, Soumya Kanti Ghosh 0001, Pallab Dasgupta |
Concurrent Usage Control Implementation Verification Using the SPIN Model Checker. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi |
Detection and Classification of DDoS Attacks Using Fuzzy Inference System. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | M. K. Sandhya, Krishnan Murugan |
Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | S. Sangeetha, S. Haripriya, S. G. Mohana Priya, Vaidehi V., N. Srinivasan |
Fuzzy Rule-Base Based Intrusion Detection System on Application Layer. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | G. Ramesh, R. Umarani |
Data Security in Local Area Network Based on Fast Encryption Algorithm. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad |
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Miroslav Novotný, Filip Zavoral |
BubbleTrust: A Reliable Trust Management for Large P2P Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ranaganayakulu Dhanalakshmi, Chenniappan Chellappan |
Detection and Recognition of File Masquerading for E-mail and Data Security. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Kumar Tak, Shashikala Tapaswi |
Knowledge Base Compound Approach towards Spam Detection. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Momani |
Trust Models in Wireless Sensor Networks: A Survey. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, Shruti Bansal |
A Deviation Based Outlier Intrusion Detection System. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | D. Roselin Selvarani |
Secured Paradigm for Mobile Databases. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Dembla, Yogesh Chaba |
Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | N. Muraleedharan, Arun Parmar |
A Flow Based Slow and Fast Scan Detection System. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Krishnan Kumar, J. Nafeesa Begum, V. Sumathy |
Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sugam Sharma, Shashi K. Gadia |
On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | N. Bhalaji 0001, A. Shanmugam |
A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Anjan K. Koundinya, Jibi Abraham |
Behavioral Analysis of Transport Layer Based Hybrid Covert Channel. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Animesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra |
A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Niwas Maskey, Gitanjali Sachdeva |
Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Madhumita Chatterjee, G. Sivakumar |
Dynamic Policy Adaptation for Collaborative Groups. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | R. Kayalvizhi, M. Vijayalakshmi, Vaidehi V. |
Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Narendran Rajagopalan, C. Mala |
Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | N. C. Raghu, M. K. Chaithanya, P. R. L. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat |
Trust Management Framework for Ubiquitous Applications. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan |
Image Classification for More Reliable Steganalysis. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ankur Gupta 0001 |
Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | A. P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P. Amritha |
A Novel Approach for Compressed Video Steganography. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | T. Subashri, B. Gokul Vinoth Kumar, Vaidehi V. |
Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Muttukrishnan Rajarajan, Andrea Zisman |
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Byeong-Tae Ahn |
Implementation of MPEG-7 Document Management System Based on Native Database. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Kumar Tak, Vaibhav Bhargava |
Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Farag Azzedin, Sajjad Mahmood |
Towards Designing Application Specific Trust Treated Model. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | M. Anandhavalli, Mrinal Kanti Ghose, K. Gauthaman, M. Boosha |
Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai (eds.) |
Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh 0001, Pallab Dasgupta |
A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|
1 | N. R. Sunitha, B. B. Amberker |
Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme. |
CNSA |
2010 |
DBLP DOI BibTeX RDF |
|