The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CNSA"( http://dblp.L3S.de/Venues/CNSA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cnsa

Publication years (Num. hits)
2010 (64)
Publication types (Num. hits)
inproceedings(63) proceedings(1)
Venues (Conferences, Journals, ...)
CNSA(64)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 64 publication records. Showing 64 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Giovanni Schmid, Francesco Rossi A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jaydip Sen A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Salman Abdul Moiz, Lakshmi Rajamani, Supriya N. Pal Design and Implementation of Pessimistic Commit Protocols in Mobile Environments. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vishal Gupta, Ashutosh Saxena Privacy Layer for Business Intelligence. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli R. Prasad, Ramjee Prasad Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, Parikshit Mahalle Security for Contactless Smart Cards Using Cryptography. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru Wireless Mesh Networks: Routing Protocols and Challenges. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bharati Harsoor, Sumalatha Ramachandram Reliable Timeout Based Commit Protocol. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raja Kumar Murugesan, Sureswaran Ramadass A Hybrid Address Allocation Algorithm for IPv6. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, Vaidehi V. VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rajeev Tiwari, Gulista Khan Load Balancing in Distributed Web Caching. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Amutha Prabakar Muniyandi, Rajaram Ramasamy, Indurani A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anand Sharma, Vibha Ojha Privacy Preserving Data Mining by Cyptography. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jyoti Grover, Deepak Kumar, M. Sargurunathan, Manoj Singh Gaur, Vijay Laxmi Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1T. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, Vaidehi V. Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1D. Aruna Kumari, K. Raja Sekhar Rao, M. Suman Privacy Preserving Mining of Distributed Data Using Steganography. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jaydip Sen A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Prabhat Kumar Tiwary, Niwas Maskey, Suman Khakurel A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1V. Vijayalakshmi, L. M. Varalakshmi, G. Florence Sudha Efficient Encryption of Intra and Inter Frames in MPEG Video. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1A. Balu, Kuppusamy Krishnamoorthy Privacy Preserving Ciphertext Policy Attribute Based Encryption. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1D. V. Naga Raju, V. Valli Kumari TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Poonam Gera, Kumkum Garg, Manoj Misra Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1N. Bhalaji 0001, P. Gurunathan, A. Shanmugam Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Natarajan Meghanathan Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mithun Paul, Ashutosh Saxena Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shashi Bhanwar, Seema Bawa Reputation Enhancement in a Trust Management System. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1C. S. Lamba Security for High-Speed MANs/WANs. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Madhan Kumar Srinivasan, Paul Rodrigues 0002 A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1P. V. Rajkumar, Soumya Kanti Ghosh 0001, Pallab Dasgupta Concurrent Usage Control Implementation Verification Using the SPIN Model Checker. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi Detection and Classification of DDoS Attacks Using Fuzzy Inference System. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1M. K. Sandhya, Krishnan Murugan Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1S. Sangeetha, S. Haripriya, S. G. Mohana Priya, Vaidehi V., N. Srinivasan Fuzzy Rule-Base Based Intrusion Detection System on Application Layer. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1G. Ramesh, R. Umarani Data Security in Local Area Network Based on Fast Encryption Algorithm. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Miroslav Novotný, Filip Zavoral BubbleTrust: A Reliable Trust Management for Large P2P Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ranaganayakulu Dhanalakshmi, Chenniappan Chellappan Detection and Recognition of File Masquerading for E-mail and Data Security. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gaurav Kumar Tak, Shashikala Tapaswi Knowledge Base Compound Approach towards Spam Detection. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohammad Momani Trust Models in Wireless Sensor Networks: A Survey. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, Shruti Bansal A Deviation Based Outlier Intrusion Detection System. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1D. Roselin Selvarani Secured Paradigm for Mobile Databases. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Deepak Dembla, Yogesh Chaba Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1N. Muraleedharan, Arun Parmar A Flow Based Slow and Fast Scan Detection System. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Krishnan Kumar, J. Nafeesa Begum, V. Sumathy Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sugam Sharma, Shashi K. Gadia On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1N. Bhalaji 0001, A. Shanmugam A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Anjan K. Koundinya, Jibi Abraham Behavioral Analysis of Transport Layer Based Hybrid Covert Channel. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Animesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Niwas Maskey, Gitanjali Sachdeva Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Madhumita Chatterjee, G. Sivakumar Dynamic Policy Adaptation for Collaborative Groups. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1R. Kayalvizhi, M. Vijayalakshmi, Vaidehi V. Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Narendran Rajagopalan, C. Mala Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1N. C. Raghu, M. K. Chaithanya, P. R. L. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat Trust Management Framework for Ubiquitous Applications. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan Image Classification for More Reliable Steganalysis. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ankur Gupta 0001 Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1A. P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P. Amritha A Novel Approach for Compressed Video Steganography. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1T. Subashri, B. Gokul Vinoth Kumar, Vaidehi V. Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Muttukrishnan Rajarajan, Andrea Zisman Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Byeong-Tae Ahn Implementation of MPEG-7 Document Management System Based on Native Database. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gaurav Kumar Tak, Vaibhav Bhargava Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Farag Azzedin, Sajjad Mahmood Towards Designing Application Specific Trust Treated Model. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1M. Anandhavalli, Mrinal Kanti Ghose, K. Gauthaman, M. Boosha Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai (eds.) Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh 0001, Pallab Dasgupta A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1N. R. Sunitha, B. B. Amberker Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme. Search on Bibsonomy CNSA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #64 of 64 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license