CNSA 2010: Chennai, India
Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai (Eds.): Recent Trends in Network Security and Applications - Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings. Springer 2010 Communications in Computer and Information Science 89 ISBN 978-3-642-14477-6
Part 1 / The Third International Conference on Network Security and Applications (CNSA 2010)
M. K. Sandhya, K. Murugan: Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks. 1-10
G. Ramesh, R. Umarani: Data Security in Local Area Network Based on Fast Encryption Algorithm. 11-26
S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan: Fuzzy Rule-Base Based Intrusion Detection System on Application Layer. 27-36
Mohammad Momani: Trust Models in Wireless Sensor Networks: A Survey. 37-46
D. V. Naga Raju, V. Valli Kumari: TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups. 55-65
R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan: Image Classification for More Reliable Steganalysis. 66-74
C. S. Lamba: Security for High-Speed MANs/WANs. 75-82
Koundinya Anjan, Jibi Abraham: Behavioral Analysis of Transport Layer Based Hybrid Covert Channel. 83-92
V. Vijayalakshmi, L. M. Varalakshmi, G. Florence Sudha: Efficient Encryption of Intra and Inter Frames in MPEG Video. 93-104
R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, V. Vaidehi: VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512. 105-113
N. Bhalaji, P. Gurunathan, A. Shanmugam: Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks. 114-122
N. Bhalaji, A. Shanmugam: A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks. 123-131
T. Subashri, B. Gokul Vinoth Kumar, V. Vaidehi: Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks. 132-142
Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru: Wireless Mesh Networks: Routing Protocols and Challenges. 143-151
Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren R. Patel, Muttukrishnan Rajarajan, Andrea Zisman: Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification. 152-163
D. Roselin Selvarani: Secured Paradigm for Mobile Databases. 164-171
R. Kayalvizhi, M. Vijayalakshmi, V. Vaidehi: Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks. 172-180
Poonam Gera, Kumkum Garg, Manoj Misra: Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET. 181-190
Amutha Prabakar Muniyandi, Rajaram Ramasamy, Indurani: A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices. 201-213
P. V. Rajkumar, Soumya Kanti Ghosh, Pallab Dasgupta: Concurrent Usage Control Implementation Verification Using the SPIN Model Checker. 214-223
T. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, V. Vaidehi: Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory. 224-231
Padmalochan Bera, Soumya Maity, Soumya Kanti Ghosh, Pallab Dasgupta: A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model. 232-241
T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi: Detection and Classification of DDoS Attacks Using Fuzzy Inference System. 242-252
Ranaganayakulu Dhanalakshmi, Chenniappan Chellappan: Detection and Recognition of File Masquerading for E-mail and Data Security. 253-262
D. Aruna Kumari, K. Raja Sekhar Rao, M. Suman: Privacy Preserving Mining of Distributed Data Using Steganography. 263-269
Part 2 / First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P
N. R. Sunitha, B. B. Amberker: Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme. 270-279
Krishnan Kumar, J. Nafeesa Begum, V. Sumathy: Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks. 280-295
Prabhat Kumar Tiwary, Niwas Maskey, Suman Khakurel: A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept. 296-301
Ankur Gupta: Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise. 302-313
Niwas Maskey, Gitanjali Sachdeva: Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks. 314-322
Narendran Rajagopalan, C. Mala: Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm. 331-339
Mithun Paul, Ashutosh Saxena: Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing. 340-348
Madhan Kumar Srinivasan, Paul Rodrigues: A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies. 349-358
Miroslav Novotný, Filip Zavoral: BubbleTrust: A Reliable Trust Management for Large P2P Networks. 359-373
Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, Shruti Bansal: A Deviation Based Outlier Intrusion Detection System. 395-401

Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli R. Prasad, Ramjee Prasad: Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT). 420-429
Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad: Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges. 430-439
Giovanni Schmid, Francesco Rossi: A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks. 452-462
Natarajan Meghanathan: Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks. 463-472
Jyoti Grover, Deepak Kumar, M. Sargurunathan, Manoj Singh Gaur, Vijay Laxmi: Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. 473-482
Gaurav Kumar Tak, Vaibhav Bhargava: Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis. 483-489
Gaurav Kumar Tak, Shashikala Tapaswi: Knowledge Base Compound Approach towards Spam Detection. 490-499
N. C. Raghu, M. K. Chaithanya, P. R. L. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat: Trust Management Framework for Ubiquitous Applications. 500-508
Deepak Dembla, Yogesh Chaba: Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols. 518-527
Jaydip Sen: A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network. 528-537
Jaydip Sen: A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks. 538-547
Part 3 / First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010
Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, Parikshit Mahalle: Security for Contactless Smart Cards Using Cryptography. 558-566
A. P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P. Amritha: A Novel Approach for Compressed Video Steganography. 567-575
Animesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra: A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure. 583-592
M. Anandhavalli, M. K. Ghose, K. Gauthaman, M. Boosha: Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm. 593-602
Salman Abdul Moiz, Lakshmi Rajamani, Supriya N. Pal: Design and Implementation of Pessimistic Commit Protocols in Mobile Environments. 603-612
Sugam Sharma, Shashi K. Gadia: On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases. 613-624
Byeong-Tae Ahn: Implementation of MPEG-7 Document Management System Based on Native Database. 625-634



