Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/conf/cnsa:"
@inproceedings{DBLP:conf/cnsa/Ahn10, author = {Byeong{-}Tae Ahn}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Implementation of {MPEG-7} Document Management System Based on Native Database}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {625--634}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_63}, doi = {10.1007/978-3-642-14478-3\_63}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Ahn10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/AnandhavalliGGB10, author = {M. Anandhavalli and Mrinal Kanti Ghose and K. Gauthaman and M. Boosha}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {593--602}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_60}, doi = {10.1007/978-3-642-14478-3\_60}, timestamp = {Fri, 09 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/AnandhavalliGGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/AnjanA10, author = {Anjan K. Koundinya and Jibi Abraham}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Behavioral Analysis of Transport Layer Based Hybrid Covert Channel}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {83--92}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_9}, doi = {10.1007/978-3-642-14478-3\_9}, timestamp = {Wed, 13 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/AnjanA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/AzzedinM10, author = {Farag Azzedin and Sajjad Mahmood}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Towards Designing Application Specific Trust Treated Model}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {548--557}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_55}, doi = {10.1007/978-3-642-14478-3\_55}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/AzzedinM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/BabarMSPP10, author = {Sachin Babar and Parikshit Mahalle and Antonietta Stango and Neeli R. Prasad and Ramjee Prasad}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {420--429}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_42}, doi = {10.1007/978-3-642-14478-3\_42}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/BabarMSPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/BaluK10, author = {A. Balu and Kuppusamy Krishnamoorthy}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Privacy Preserving Ciphertext Policy Attribute Based Encryption}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {402--409}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_40}, doi = {10.1007/978-3-642-14478-3\_40}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/BaluK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/BeraMGD10, author = {Padmalochan Bera and Soumya Maity and Soumya Kanti Ghosh and Pallab Dasgupta}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A {SAT} Based Verification Framework for Wireless {LAN} Security Policy Management Supported by {STRBAC} Model}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {232--241}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_24}, doi = {10.1007/978-3-642-14478-3\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/BeraMGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/BhalajiGS10, author = {N. Bhalaji and P. Gurunathan and A. Shanmugam}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {114--122}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_12}, doi = {10.1007/978-3-642-14478-3\_12}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/BhalajiGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/BhalajiS10, author = {N. Bhalaji and A. Shanmugam}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Trust Based Technique to Isolate Non-forwarding Nodes in {DSR} Basedmobile Adhoc Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {123--131}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_13}, doi = {10.1007/978-3-642-14478-3\_13}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/BhalajiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/BhanwarB10, author = {Shashi Bhanwar and Seema Bawa}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Reputation Enhancement in a Trust Management System}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {440--451}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_44}, doi = {10.1007/978-3-642-14478-3\_44}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/BhanwarB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/ChatterjeeS10, author = {Madhumita Chatterjee and G. Sivakumar}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Dynamic Policy Adaptation for Collaborative Groups}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {374--394}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_38}, doi = {10.1007/978-3-642-14478-3\_38}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/ChatterjeeS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/DemblaC10, author = {Deepak Dembla and Yogesh Chaba}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {518--527}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_52}, doi = {10.1007/978-3-642-14478-3\_52}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/DemblaC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/DhanalakshmiC10, author = {Ranaganayakulu Dhanalakshmi and Chenniappan Chellappan}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Detection and Recognition of File Masquerading for E-mail and Data Security}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {253--262}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_26}, doi = {10.1007/978-3-642-14478-3\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/DhanalakshmiC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/GeraGM10, author = {Poonam Gera and Kumkum Garg and Manoj Misra}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in {MANET}}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {181--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_19}, doi = {10.1007/978-3-642-14478-3\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/GeraGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/GroverKSGL10, author = {Jyoti Grover and Deepak Kumar and M. Sargurunathan and Manoj Singh Gaur and Vijay Laxmi}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {473--482}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_47}, doi = {10.1007/978-3-642-14478-3\_47}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/GroverKSGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Gupta10, author = {Ankur Gupta}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Conscience-Based Routing in {P2P} Networks: Preventing Copyright Violations and Social Malaise}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {302--313}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_31}, doi = {10.1007/978-3-642-14478-3\_31}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/Gupta10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/GuptaS10, author = {Vishal Gupta and Ashutosh Saxena}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Privacy Layer for Business Intelligence}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {323--330}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_33}, doi = {10.1007/978-3-642-14478-3\_33}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/GuptaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/HarsoorR10, author = {Bharati Harsoor and Sumalatha Ramachandram}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Reliable Timeout Based Commit Protocol}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {410--419}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_41}, doi = {10.1007/978-3-642-14478-3\_41}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/HarsoorR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/KayalvizhiSSGV10, author = {R. Kayalvizhi and R. Harihara Subramanian and R. Girish Santhosh and J. Gurubaran and Vaidehi V.}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {{VLSI} Design and Implementation of Combined Secure Hash Algorithm {SHA-512}}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {105--113}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_11}, doi = {10.1007/978-3-642-14478-3\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/KayalvizhiSSGV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/KayalvizhiVV10, author = {R. Kayalvizhi and M. Vijayalakshmi and Vaidehi V.}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Energy Analysis of {RSA} and {ELGAMAL} Algorithms for Wireless Sensor Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {172--180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_18}, doi = {10.1007/978-3-642-14478-3\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/KayalvizhiVV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/KumarBS10, author = {Krishnan Kumar and J. Nafeesa Begum and V. Sumathy}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {280--295}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_29}, doi = {10.1007/978-3-642-14478-3\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/KumarBS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/KumarR10, author = {Madhan Kumar Srinivasan and Paul Rodrigues}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {349--358}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_36}, doi = {10.1007/978-3-642-14478-3\_36}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/KumarR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/KumariRS10, author = {D. Aruna Kumari and K. Raja Sekhar Rao and M. Suman}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Privacy Preserving Mining of Distributed Data Using Steganography}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {263--269}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_27}, doi = {10.1007/978-3-642-14478-3\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/KumariRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/KundarapCSSDM10, author = {Anuj Kundarap and Arpit Chhajlani and Rashu Singla and Mugdha Sawant and Milind Dere and Parikshit Mahalle}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Security for Contactless Smart Cards Using Cryptography}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {558--566}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_56}, doi = {10.1007/978-3-642-14478-3\_56}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/KundarapCSSDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Lamba10, author = {C. S. Lamba}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Security for High-Speed MANs/WANs}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {75--82}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_8}, doi = {10.1007/978-3-642-14478-3\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Lamba10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/MahalleBPP10, author = {Parikshit Mahalle and Sachin Babar and Neeli R. Prasad and Ramjee Prasad}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {430--439}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_43}, doi = {10.1007/978-3-642-14478-3\_43}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/MahalleBPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/MaskeyS10, author = {Niwas Maskey and Gitanjali Sachdeva}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {314--322}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_32}, doi = {10.1007/978-3-642-14478-3\_32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/MaskeyS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Meghanathan10, author = {Natarajan Meghanathan}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {463--472}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_46}, doi = {10.1007/978-3-642-14478-3\_46}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Meghanathan10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/MoizRP10, author = {Salman Abdul Moiz and Lakshmi Rajamani and Supriya N. Pal}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Design and Implementation of Pessimistic Commit Protocols in Mobile Environments}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {603--612}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_61}, doi = {10.1007/978-3-642-14478-3\_61}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/MoizRP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Momani10, author = {Mohammad Momani}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Trust Models in Wireless Sensor Networks: {A} Survey}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {37--46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_4}, doi = {10.1007/978-3-642-14478-3\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Momani10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/MuniyandiRI10, author = {Amutha Prabakar Muniyandi and Rajaram Ramasamy and Indurani}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A New Remote Mutual Authentication Scheme for {WI-FI} Enabledhand-Held Devices}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {201--213}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_21}, doi = {10.1007/978-3-642-14478-3\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/MuniyandiRI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/MuraleedharanP10, author = {N. Muraleedharan and Arun Parmar}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Flow Based Slow and Fast Scan Detection System}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {191--200}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_20}, doi = {10.1007/978-3-642-14478-3\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/MuraleedharanP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/MurugesanR10, author = {Raja Kumar Murugesan and Sureswaran Ramadass}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Hybrid Address Allocation Algorithm for IPv6}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {509--517}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_51}, doi = {10.1007/978-3-642-14478-3\_51}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/MurugesanR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/NovotnyZ10, author = {Miroslav Novotn{\'{y}} and Filip Zavoral}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {BubbleTrust: {A} Reliable Trust Management for Large {P2P} Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {359--373}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_37}, doi = {10.1007/978-3-642-14478-3\_37}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/NovotnyZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/PareekMSCB10, author = {Vikas Pareek and Aditi Mishra and Arpana Sharma and Rashmi Chauhan and Shruti Bansal}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Deviation Based Outlier Intrusion Detection System}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {395--401}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_39}, doi = {10.1007/978-3-642-14478-3\_39}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/PareekMSCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/PatelBPPRZ10, author = {Reema Patel and Bhavesh Borisaniya and Avi Patel and Dhiren R. Patel and Muttukrishnan Rajarajan and Andrea Zisman}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {152--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_16}, doi = {10.1007/978-3-642-14478-3\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/PatelBPPRZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/PaulS10, author = {Mithun Paul and Ashutosh Saxena}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {340--348}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_35}, doi = {10.1007/978-3-642-14478-3\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/PaulS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/PonnapalliBTV10, author = {Pavan Kumar Ponnapalli and Ramesh Babu Battula and Pavan Kumar Tummala and Srikanth Vemuru}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Wireless Mesh Networks: Routing Protocols and Challenges}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {143--151}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_15}, doi = {10.1007/978-3-642-14478-3\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/PonnapalliBTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/RaghuCLJMS10, author = {N. C. Raghu and M. K. Chaithanya and P. R. L. Lakshmi and G. Jyostna and B. Manjulatha and N. Sarat}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Trust Management Framework for Ubiquitous Applications}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {500--508}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_50}, doi = {10.1007/978-3-642-14478-3\_50}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/RaghuCLJMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/RajagopalanM10, author = {Narendran Rajagopalan and C. Mala}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {331--339}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_34}, doi = {10.1007/978-3-642-14478-3\_34}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/RajagopalanM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/RajeevG10, author = {Rajeev Tiwari and Gulista Khan}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Load Balancing in Distributed Web Caching}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {47--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_5}, doi = {10.1007/978-3-642-14478-3\_5}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/RajeevG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/RajkumarGD10, author = {P. V. Rajkumar and Soumya Kanti Ghosh and Pallab Dasgupta}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Concurrent Usage Control Implementation Verification Using the {SPIN} Model Checker}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {214--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_22}, doi = {10.1007/978-3-642-14478-3\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/RajkumarGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/RajuK10, author = {D. V. Naga Raju and V. Valli Kumari}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {{TRING:} {A} New Framework for Efficient Group Key Distribution for Dynamic Groups}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {55--65}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_6}, doi = {10.1007/978-3-642-14478-3\_6}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/RajuK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/RameshU10, author = {G. Ramesh and R. Umarani}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Data Security in Local Area Network Based on Fast Encryption Algorithm}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {11--26}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_2}, doi = {10.1007/978-3-642-14478-3\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/RameshU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SandhyaM10, author = {M. K. Sandhya and Krishnan Murugan}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {1--10}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_1}, doi = {10.1007/978-3-642-14478-3\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/SandhyaM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SangeethaHPVS10, author = {S. Sangeetha and S. Haripriya and S. G. Mohana Priya and Vaidehi V. and N. Srinivasan}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Fuzzy Rule-Base Based Intrusion Detection System on Application Layer}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {27--36}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_3}, doi = {10.1007/978-3-642-14478-3\_3}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/SangeethaHPVS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SchmidR10, author = {Giovanni Schmid and Francesco Rossi}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A-Code: {A} New Crypto Primitive for Securing Wireless Sensor Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {452--462}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_45}, doi = {10.1007/978-3-642-14478-3\_45}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/SchmidR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Selvarani10, author = {D. Roselin Selvarani}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Secured Paradigm for Mobile Databases}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {164--171}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_17}, doi = {10.1007/978-3-642-14478-3\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Selvarani10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Sen10, author = {Jaydip Sen}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {528--537}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_53}, doi = {10.1007/978-3-642-14478-3\_53}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Sen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/Sen10a, author = {Jaydip Sen}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {538--547}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_54}, doi = {10.1007/978-3-642-14478-3\_54}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/Sen10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SharmaG10, author = {Sugam Sharma and Shashi K. Gadia}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An {XML} Exploitation in Spatial Databases}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {613--624}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_62}, doi = {10.1007/978-3-642-14478-3\_62}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/SharmaG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SharmaO10, author = {Anand Sharma and Vibha Ojha}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Privacy Preserving Data Mining by Cyptography}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {576--582}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_58}, doi = {10.1007/978-3-642-14478-3\_58}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/SharmaO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SherlySRA10, author = {A. P. Sherly and Sapna Sasidharan and Ashji S. Raj and P. P. Amritha}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Novel Approach for Compressed Video Steganography}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {567--575}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_57}, doi = {10.1007/978-3-642-14478-3\_57}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/SherlySRA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/ShreelekshmiWM10, author = {R. Shreelekshmi and M. Wilscy and C. E. Veni Madhavan}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Image Classification for More Reliable Steganalysis}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {66--74}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_7}, doi = {10.1007/978-3-642-14478-3\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/ShreelekshmiWM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SubashriAKV10, author = {T. Subashri and R. Arunachalam and B. Gokul Vinoth Kumar and Vaidehi V.}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Pipelining Architecture of {AES} Encryption and Key Generation with Search Based Memory}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {224--231}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_23}, doi = {10.1007/978-3-642-14478-3\_23}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/SubashriAKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SubashriKV10, author = {T. Subashri and B. Gokul Vinoth Kumar and Vaidehi V.}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {132--142}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_14}, doi = {10.1007/978-3-642-14478-3\_14}, timestamp = {Sun, 31 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsa/SubashriKV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SubbulakshmiSRR10, author = {T. Subbulakshmi and S. Mercy Shalinie and C. Suneel Reddy and A. Ramamoorthi}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Detection and Classification of DDoS Attacks Using Fuzzy Inference System}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {242--252}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_25}, doi = {10.1007/978-3-642-14478-3\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/SubbulakshmiSRR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/SunithaA10, author = {N. R. Sunitha and B. B. Amberker}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {270--279}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_28}, doi = {10.1007/978-3-642-14478-3\_28}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/SunithaA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/TakB10, author = {Gaurav Kumar Tak and Vaibhav Bhargava}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {483--489}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_48}, doi = {10.1007/978-3-642-14478-3\_48}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/TakB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/TakT10, author = {Gaurav Kumar Tak and Shashikala Tapaswi}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Knowledge Base Compound Approach towards Spam Detection}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {490--499}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_49}, doi = {10.1007/978-3-642-14478-3\_49}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/TakT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/TiwaryMK10, author = {Prabhat Kumar Tiwary and Niwas Maskey and Suman Khakurel}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {296--301}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_30}, doi = {10.1007/978-3-642-14478-3\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/TiwaryMK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/TripathyDP10, author = {Animesh Tripathy and Subhalaxmi Das and Prashanta Kumar Patra}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {583--592}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_59}, doi = {10.1007/978-3-642-14478-3\_59}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/TripathyDP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsa/VijayalakshmiVS10, author = {V. Vijayalakshmi and L. M. Varalakshmi and G. Florence Sudha}, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Efficient Encryption of Intra and Inter Frames in {MPEG} Video}, booktitle = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, pages = {93--104}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3\_10}, doi = {10.1007/978-3-642-14478-3\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/VijayalakshmiVS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cnsa/2010, editor = {Natarajan Meghanathan and Selma Boumerdassi and Nabendu Chaki and Dhinaharan Nagamalai}, title = {Recent Trends in Network Security and Applications - Third International Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {89}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14478-3}, doi = {10.1007/978-3-642-14478-3}, isbn = {978-3-642-14477-6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsa/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.