ACITY 2012: Chennai, India
Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki (Eds.): Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1. Springer 2012 Advances in Intelligent Systems and Computing 176 ISBN 978-3-642-31512-1
P. R. Mahalingam: Intelligent Network-Based Intrusion Detection System (iNIDS). 1-9
Tumpa Roy, Poonam Sisodia, Divye Upadhyay, Kamlesh Dutta: Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password. 11-22
S. V. Nagaraj: Securing Multi-agent Systems: A Survey. 23-30
Gaurav Varshney, Ramesh Chandra Joshi, Anjali Sardana: Personal Secret Information Based Authentication towards Preventing Phishing Attacks. 31-42
Premraj Mahajan, Anjali Sardana: Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis. 43-53
M. Sasirekha, I. Sumaiya Thaseen, J. Saira Banu: An Integrated Intrusion Detection System for Credit Card Fraud Detection. 55-60
Majid Nezakatolhoseini, Sam Jabbehdari, Mohammad Ali Pourmina: Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems. 61-70
D. Chandramohan, D. Veeraiah, M. Shanmugam, N. Balaji, G. Sambasivam, Shailesh Khapre: SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues. 81-86

Priyanka Dey, Suparna Biswas: Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts. 103-112
Nur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha: A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders. 131-140
J. Valarmathi, K. Lakshmi, R. S. Menaga, K. V. Abirami, V. Rhymend Uthariaraj: SLA for a Pervasive Healthcare Environment. 141-149
Mayank Kumar Goyal, Alok Aggarwal: Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment. 151-157
Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra, Subrata Nandi: SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN. 159-169
Swathi Bhumireddy, Somanath Tripathy, Rakesh Matam: Secure Peer-Link Establishment in Wireless Mesh Networks. 189-198
Uttam Kr. Mondal, Jyotsna Kumar Mandal: Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT). 199-208
Chaitali Biswas Dutta, Utpal Biswas: Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV. 209-218
Ambrish Srivastav, Nitin Hambir: English to Hindi Machine Translator Using GMT and RBMT Approach. 219-225
Nishant Goswami, Tarulata Chauhan, Nishant Doshi: Efficient Cryptography Technique on Perturbed Data in Distributed Environment. 239-244
K. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna, S. Rubika: A Novel Triangle Centroid Authentication Protocol for Cloud Environment. 245-254
Ahtesham Akhtar Patel, S. Jaya Nirmala, S. Mary Saira Bhanu: Security and Availability of Data in the Cloud. 255-261
Shanta Mandal, Rituparna Chaki: A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks. 263-271
Pratima Sarkar, Rituparna Chaki: A Cryptographic Approach towards Black Hole Attack Detection. 273-278
Bukke Devendra Naik, Sarath Chandra Boddukolu, Pothula Sujatha, P. Dhavachelvan: Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels. 279-288
Jagadeesh Kakarla, S. Siva Sathya: Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc Networks. 289-298
Mayank Kumar Goyal, Yatendra Kumar Verma, Paras Bassi, Paurush Kumar Misra: Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission Links. 299-306
L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai: Personalised High Quality Search with in a Web Site: No User Profiling. 307-316
Tulsidas Patil, Ganesh Dattatray Bhutkar, Noshir Tarapore: Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System. 317-328
Sundarapandian Vaidyanathan: Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode Control. 329-337
Aakanksha Pandey, Nilay Khare: String Matching Technique Based on Hardware: A Comparative Analysis. 339-347
R. Shyamala, S. Valli: Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks. 349-359
Chandra Thapa, C. Chandrasekhar: Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular Network. 361-367
B. Siva Kumar Reddy, M. Sakthi Ganesh, P. Venkata Krishna: Temporary Parallel Route Recovery for Frequent Link Failure in VANET. 369-374
Manjusha Karkhanis, Achala Deshmukh: Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator. 375-383
Shailaja Patil, Ashish Gupta, Mukesh Zaveri: Efficient Target Recovery in Wireless Sensor Network. 385-394
Soma Bandyopadhyay, Abhijan Bhattacharyya: Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System. 395-404

Debajyoti Mukhopadhyay, Sheetal Vij, Suyog Tasare: NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component. 425-434
S. Indu Vadhani, G. Vithya, B. Vinayagasundaram: Quantum DOT Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor. 435-445
Suparna Biswas, Sarmistha Neogy: Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network. 447-456
Lakshmi Priya, M. Meenakshi, G. Geetha: Design of Broadband Optical Sources for OCDMA/WDMA Applications. 457-466
Shailaja Patil, Mukesh Zaveri: Localization in Wireless Sensor Network: A Distributed Approach. 467-476

K. Rahimunnisa, M. Priya Zach, S. Suresh Kumar, J. Jayakumar: Efficient Techniques for the Implementation of AES SubByte and MixColumn Transformations. 497-506

D. Chandramohan, T. Vengattaraman, M. S. Saleem Basha, P. Dhavachelvan: MSRCC - Mitigation of Security Risks in Cloud Computing. 525-532
Kirti Dhwaj, Rachit Garg, Gaurav Mishra, Neetesh Purohit: Design and Analysis of Dual Capacitively Loaded C-PIFA. 543-550
Nithin Srinivasan, Sriram Ravichandran, Shruthi Ravichandran, Prabagarane Nagaradjane: Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channels. 563-573
C. H. Sandhya, Deepali R. Borade, Rinki Sharma, Govind R. Kadambi: Multi-dimensional Performance Characterization of Directional Antennas for Applications in Energy Efficient Ad-Hoc Network. 575-585
Rakesh Matam, Somanath Tripathy: Reliability Enhanced Routing Protocol for Wireless Mesh Networks. 587-596
Monomita Mazumdar, Srimanta Halder, Prasenjit Chanak, Indrajit Banerjee: DARIH: Distributed Adaptive Routing via Information Highway in Sensor Network. 597-607
Preetha Theresa Joy, K. Polouse Jacob: A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks. 609-619
Srimanta Halder, Monomita Mazumdar, Prasenjit Chanak, Indrajit Banerjee: FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor Network. 621-631
Banda Sreenivas, S. Ramesh Babu, S. Prabhakar, D. Karunakar Reddy: Effective Resource Allocation Technique for Wireless Cellular System. 633-640
Rajesh P. Barnwal, Arnab Thakur: Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots. 641-649
Payal Chaudhari, Hiteishi Diwanji: Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack. 651-660
Subrata Dutta, Nandini Mukherjee, Monideepa Roy, Sarmistha Neogy: Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in WSN. 671-683
Gaurav Sikri, Rajni: Peak to Average Power Ratio Reduction in OFDM System over PAM, QAM and QPSK Modulation. 685-690
Ayan Kumar Das, Rituparna Chaki: MERCC: Multiple Events Routing with Congestion Control for WSN. 691-698
Paras Gupta, Manu Vardhan, Akhil Goel, Abhinav Verma, Dharmender Singh Kushwaha: On the Fly File Dereplication Mechanism. 709-718
Durgesh Bajpai, Manu Vardhan, Sachin Gupta, Ravinder Kumar, Dharmender Singh Kushwaha: Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services. 719-728
Hemant Hariyale, Manu Vardhan, Ankit Pandey, Ankit Mishra, Dharmender Singh Kushwaha: Load Balancing in Cluster Using BLCR Checkpoint/Restart. 729-737
Utpal Nandi, Jyotsna Kumar Mandal: Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging. 739-748
Manpreet Kaur, Rajni, Parminder Singh: Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET. 757-763
Dipayan Bose, Arnab Banerjee, Aniruddha Bhattacharyya, Himadri Nath Saha, Debika Bhattacharyya, P. K. Banerjee: An Efficient Approach to Secure Routing in MANET. 765-776
Swarnali Hazra, S. K. Setua: Trust Oriented Secured AODV Routing Protocol against Rushing Attack. 777-788
Koushik Majumder, Sudhabindu Ray, Subir Kumar Sarkar: Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR. 797-806



