Atnaujinkite slapukų nuostatas

El. knyga: Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.
Network Security and Applications
Vulnerability Assessment Methods -- A Review
1(10)
Hiran V. Nath
Collaborative Polling Scheme to Detect and Isolate the Colluding Packet Droppers in Mobile Ad Hoc Networks
11(12)
K. Gopalakrishnan
V. Rhymend Uthariaraj
Defense Strategy against Network Worms Causing ICMP Attacks and Its Forensic Analysis
23(12)
K.S. Aathira
Thulasi N. Kutty
Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM
35(8)
Ashji S. Raj
Chungath Srinivasan
Design of Secure Chaotic Hash Function Based on Logistic and Tent Maps
43(10)
P. Jhansi Rani
M. Sambasiva Rao
S. Durga Bhavani
Detecting Anomalous Application Behaviors Using a System Call Clustering Method over Critical Resources
53(12)
Grandhi Jyostna
Pareek Himanshu
P.R.L. Eswari
Behavioral Malware Detection Expert System -- Tarantula
65(13)
Sandeep Romana
Swapnil Phadnis
Pareek Himanshu
P.R.L. Eswari
Tool for Prevention and Detection of Phishing E-Mail Attacks
78(11)
Shamal M. Firake
Pravin Soni
B.B. Meshram
Improvement of QoS Performance in MANET by QoS-TORA: A TORA Based QoS Routing Algorithm
89(11)
Govind Kumar Jha
Neeraj Kumar
Himanshu Sharma
K.G. Sharma
Authentication Process in IEEE 802.11: Current Issues and Challenges
100(13)
Dinesh Yadav
Anjali Sardana
Network Level Anomaly Detection System Using MST Based Genetic Clustering
113(10)
P. Kola Sujatha
R. Aran
P.V. Shanthoosh
I. Ezra Prince Jebahar
A. Kannan
A Hybrid Approach to Texture Classification
123(8)
B. Vijayalakshmi
V. Subbiah Bharathi
Completeness of LAN Attack Detection Using Discrete Event Systems
131(9)
F.A. Barbhuiya
N. Hubballi
S. Biswas
S. Nandi
Designing Dependable Web Services Security Architecture Solutions
140(10)
D. Shravani
P. Suresh Varma
B. Padmaja Rani
M. Upendra Kumar
A. V. Krishna Prasad
Protocol for Simultaneous Ownership Transfer of Multiple RFID Tags with TTP
150(7)
Wei Zhou
Selwyn Piramuthu
A Preventive Measure to Protect from Denial of Service Attack
157(10)
Manas Ku. Dasmohapatra
Kamalika Datta
Indranil Sengupta
Review of Some Checkpointing Algorithms for Distributed and Mobile Systems
167(11)
Sunil Kumar Gupta
Parveen Kumar
Using Raga as a Cryptographic Tool
178(6)
Sandip Dutta
Soubhik Chakraborty
N. C. Mahanti
Combining Power of MATLAB with System Verilog for Image and Video Processing ASIC Verification
184(10)
Dhavai Modi
Harsh Sitapara
Rahul Shah
Ekata Mehul
Pinal Engineer
Memory Attack Detection of Cryptographic Algorithm
194(10)
K. Rahirnunnisa
Rincy Merrin Varkey
S. Sureshkumar
Performance Comparison of Queueing Disciplines for Aeerg Protocol in Manet
204(10)
S. Rajeswari
Y. Venkataramani
Design of a Cryptographic Tamper Detection Scheme for Network Security
214(11)
B. Srinivasa Rao
S.D.V. Prasad
Energy Efficient and Congestion Control Multipath Routing in Wireless Sensor Networks
225(14)
M. Nesa Sudha
Sapna E. John
M.L. Valarmathi
Intrusion Prevention by Native Language Password Authentication Scheme
239(10)
Sree Latha Malempati
Shashi Mogalla
An Improved Uncertainty Reduction Scheme Based on Bayesian Prediction in MANETs
249(9)
B. Lydia Elizabeth
S. Sudha
A. John Prakash
V. Rhymend Uthariaraj
Scalable Implementation of Active Detection Mechanism for LAN Based Attacks
258(10)
G. Bansal
N. Kumar
F.A. Barbhuiya
S. Biswas
S. Nandi
A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network
268(13)
Tapolina Bhattasali
Rituparna Chaki
Secure Network Steganographic Scheme Exploiting TCP Sequence Numbers
281(11)
Vengala Satish Kumar
Tanima Dutta
Arijit Sur
Sukumar Nandi
Intrusion Detection System Based on Real Time Rule Accession and Honeypot
292(10)
Abhay Nath Singh
Shiv Kumar
R.C. Joshi
Key Predistribution in 3-Dimensional Grid-Group Deployment Scheme
302(18)
Samiran Bag
Novel Methods for Montgomery Modular Multiplication for Public Key Cryptosystems
320(11)
V.R. Venkatasubramani
M. Surendar
S. Rajaram
Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture
331(13)
Alwyn Roshan Pais
D.J. Deepak
B.R. Chandavarkar
Highly Resilient Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes for Wireless Sensor Network
344(12)
Samiran Bag
Amrita Saha
Pinaki Sarkar
Improving Fairness in Network Traffic by Controlling Congestion and Unresponsive Flows
356(8)
M. Azath
R.S.D. Wahida Banu
A. Neela Madheswari
Authenticated Routing for Ad-Hoc On-Demand Distance Vector Routing Protocol
364(10)
Preeti Sachan
Pabitra Mohan Khilar
Passblot: A Usable Way of Authentication Scheme to Generate One Time Passwords
374(9)
Sainath Gupta
Pruthvi Sabbu
Siddhartha Varma
Suryakanth V. Garigashetty
Safeguarding Web Services Using Self-adaptive Schema Hardening Algorithm
383(10)
Vipul Patel
Radhesh Mohandas
Alwyn Pais
Modeling and Performance Analysis of QAM System
393(9)
T.P. Surekha
T. Ananthapadmanabha
C. Puttamadappa
A.P. Kavya
An IDS Evaluation-Centric Taxonomy of Wireless Security Attacks
402(12)
Khalid Nasr
Anas Abou-El Kalam
Christian Fraboul
Rational Secret Sharing with Honest Players over an Asynchronous Channel
414(13)
William K. Moses Jr.
C. Pandu Rangan
Agent Based Cross Layer Intrusion Detection System for MANET
427(14)
V. Anjana Devi
R.S. Bhuvaneswaran
Evaluating Machine Learning Algorithms for Detecting DDoS Attacks
441(12)
Manjula Suresh
R. Anitha
Insecure Query Processing in the Delay/Fault Tolerant Mobile Sensor Network (DFT-MSN) and Mobile Peer to Peer Network
453(10)
Rahul Johari
Neelima Gupta
Financial Time Series Volatility Forecast Using Evolutionary Hybrid Artificial Neural Network
463(9)
Anupam Tarsauliya
Rahul Kala
Ritu Tiwari
Anupam Shukla
Data Security in Free Roaming Mobile Agents
472(11)
G. Geetha
C. Jayakumar
End-to-End Security for At-Home Medical Monitoring
483(6)
Mohanavalli Seetha Subramanian
Sheila Anand
Web Mining Research and Future Directions
489(8)
G. Dileep Kumar
Manohar Gosul
Difference between Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
497(5)
Asmaa Shaker Ashoor
Sharad Gore
Conditional Proxy Re-Encryption -- A More Efficient Construction
502(11)
S. Sree Vivek
S. Sharmila Deva Selvi
V. Radhakishan
C. Pandu Rangan
Study of Mai ware Threats Faced by the Typical Email User
513(13)
Anthony Ayodele
James Henrydoss
Walter Schrier
T.E. Boult
Ad Hoc, Sensor and Ubiquitous Computing
Sequential Multi-Clustering Protocol Using a Node Deployment Protocol for Efficient Multiclustering in Wireless Sensor Networks
526(11)
Pradipta Ghosh
Joydeep Banerjee
Swarup Kumar Mirta
Souvik Kumar Mitra
Mrinal Kanti Naskar
Online Based Fuzzy Analyzer for Arrhythmia Detection
537(8)
K.A. Sunitha
N. Senthil Kumar
S.S. Dash
K. Prema
A Novel Autonomic Design Pattern for Invocation OF Services
545(7)
V.S. Prasad Vasireddy
Vishnuvardhan Mannava
T. Ramesh
A Novel Way of Providing Dynamic Adaptability and Invocation of JADE Agent Services from P2P JXTA Using Aspect Oriented Programming
552(12)
Vishnuvardhan Mannava
T. Ramesh
V.S. Prasad Vasireddy
A Novel Way of Providing Dynamic Adaptability in P2P JXTA Multicast Sockets and P2P JXTA-WS Using Aspect Oriented Programming
564(13)
Vishnuvardhan Mannava
T. Ramesh
Bangaru Babu Kuravadi
Intelligent Energy Efficient Routing for Ad-Hoc Sensor Network by Designing QCS Protocol
577(10)
Debaditya Ghosh
Pritam Majumder
Ayan Kumar Das
Peer-to-Peer Networks And Trust Management
A New Approach for Securing Mobile Adhoc Network with an Improved Trust Calculation Method
587(11)
Amit Chauhan
Nidhi Shah
A Routing Protocol for Facilitating Multimedia Transmission over 802.11e Based Mobile Ad Hoc Networks
598(10)
Sujatha P. Terdal
V.D. Mytri
A. Damodaram
Uday S.B.
A Survey on Dataspace
608(14)
Mrityunjay Singh
S.K. Jain
A Novel Social Network Model for Business Collaboration
622(9)
Sreedhar Bhukya
A Novel Way of Providing Dynamic Adaptability in P2P JXTA Sockets Using Aspect Oriented Programming
631(9)
Vishnuvardhan Mannava
T. Ramesh
A Novel Way of Providing Dynamic Adaptability in P2P JXTA Services Using Aspect Oriented Programming
640(9)
Vishnuvardhan Mannava
T. Ramesh
Trust Management for Grid Environment Using Rule Based Fuzzy Logic
649(10)
Mohd Noman Siddiqui
Vinit Saini
Ravinder Ahuja
Author Index 659