Search dblp for Publications

export results for "toc:db/conf/cnsa/cnsa2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cnsa/Ahn10,
  author       = {Byeong{-}Tae Ahn},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Implementation of {MPEG-7} Document Management System Based on Native
                  Database},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {625--634},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_63},
  doi          = {10.1007/978-3-642-14478-3\_63},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Ahn10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/AnandhavalliGGB10,
  author       = {M. Anandhavalli and
                  Mrinal Kanti Ghose and
                  K. Gauthaman and
                  M. Boosha},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Global Search Analysis of Spatial Gene Expression Data Using Genetic
                  Algorithm},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {593--602},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_60},
  doi          = {10.1007/978-3-642-14478-3\_60},
  timestamp    = {Fri, 09 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/AnandhavalliGGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/AnjanA10,
  author       = {Anjan K. Koundinya and
                  Jibi Abraham},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Behavioral Analysis of Transport Layer Based Hybrid Covert Channel},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {83--92},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_9},
  doi          = {10.1007/978-3-642-14478-3\_9},
  timestamp    = {Wed, 13 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/AnjanA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/AzzedinM10,
  author       = {Farag Azzedin and
                  Sajjad Mahmood},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Towards Designing Application Specific Trust Treated Model},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {548--557},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_55},
  doi          = {10.1007/978-3-642-14478-3\_55},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/AzzedinM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/BabarMSPP10,
  author       = {Sachin Babar and
                  Parikshit Mahalle and
                  Antonietta Stango and
                  Neeli R. Prasad and
                  Ramjee Prasad},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Proposed Security Model and Threat Taxonomy for the Internet of Things
                  (IoT)},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {420--429},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_42},
  doi          = {10.1007/978-3-642-14478-3\_42},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/BabarMSPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/BaluK10,
  author       = {A. Balu and
                  Kuppusamy Krishnamoorthy},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Privacy Preserving Ciphertext Policy Attribute Based Encryption},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {402--409},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_40},
  doi          = {10.1007/978-3-642-14478-3\_40},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/BaluK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/BeraMGD10,
  author       = {Padmalochan Bera and
                  Soumya Maity and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A {SAT} Based Verification Framework for Wireless {LAN} Security Policy
                  Management Supported by {STRBAC} Model},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {232--241},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_24},
  doi          = {10.1007/978-3-642-14478-3\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/BeraMGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/BhalajiGS10,
  author       = {N. Bhalaji and
                  P. Gurunathan and
                  A. Shanmugam},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Performance Comparison of Multicast Routing Protocols under Variable
                  Bit Rate Scenario for Mobile Adhoc Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {114--122},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_12},
  doi          = {10.1007/978-3-642-14478-3\_12},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/BhalajiGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/BhalajiS10,
  author       = {N. Bhalaji and
                  A. Shanmugam},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Trust Based Technique to Isolate Non-forwarding Nodes in {DSR} Basedmobile
                  Adhoc Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {123--131},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_13},
  doi          = {10.1007/978-3-642-14478-3\_13},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/BhalajiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/BhanwarB10,
  author       = {Shashi Bhanwar and
                  Seema Bawa},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Reputation Enhancement in a Trust Management System},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {440--451},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_44},
  doi          = {10.1007/978-3-642-14478-3\_44},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/BhanwarB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/ChatterjeeS10,
  author       = {Madhumita Chatterjee and
                  G. Sivakumar},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Dynamic Policy Adaptation for Collaborative Groups},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {374--394},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_38},
  doi          = {10.1007/978-3-642-14478-3\_38},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/ChatterjeeS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/DemblaC10,
  author       = {Deepak Dembla and
                  Yogesh Chaba},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Modeling and Performance Analysis of Efficient and Dynamic Probabilistic
                  Broadcasting Algorithm in MANETs Routing Protocols},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {518--527},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_52},
  doi          = {10.1007/978-3-642-14478-3\_52},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/DemblaC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/DhanalakshmiC10,
  author       = {Ranaganayakulu Dhanalakshmi and
                  Chenniappan Chellappan},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Detection and Recognition of File Masquerading for E-mail and Data
                  Security},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {253--262},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_26},
  doi          = {10.1007/978-3-642-14478-3\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/DhanalakshmiC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/GeraGM10,
  author       = {Poonam Gera and
                  Kumkum Garg and
                  Manoj Misra},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Detection and Mitigation of Attacks by Colluding Misbehaving Nodes
                  in {MANET}},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {181--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_19},
  doi          = {10.1007/978-3-642-14478-3\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/GeraGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/GroverKSGL10,
  author       = {Jyoti Grover and
                  Deepak Kumar and
                  M. Sargurunathan and
                  Manoj Singh Gaur and
                  Vijay Laxmi},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Performance Evaluation and Detection of Sybil Attacks in Vehicular
                  Ad-Hoc Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {473--482},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_47},
  doi          = {10.1007/978-3-642-14478-3\_47},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/GroverKSGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Gupta10,
  author       = {Ankur Gupta},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Conscience-Based Routing in {P2P} Networks: Preventing Copyright Violations
                  and Social Malaise},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {302--313},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_31},
  doi          = {10.1007/978-3-642-14478-3\_31},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/Gupta10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/GuptaS10,
  author       = {Vishal Gupta and
                  Ashutosh Saxena},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Privacy Layer for Business Intelligence},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {323--330},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_33},
  doi          = {10.1007/978-3-642-14478-3\_33},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/GuptaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/HarsoorR10,
  author       = {Bharati Harsoor and
                  Sumalatha Ramachandram},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Reliable Timeout Based Commit Protocol},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {410--419},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_41},
  doi          = {10.1007/978-3-642-14478-3\_41},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/HarsoorR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/KayalvizhiSSGV10,
  author       = {R. Kayalvizhi and
                  R. Harihara Subramanian and
                  R. Girish Santhosh and
                  J. Gurubaran and
                  Vaidehi V.},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {{VLSI} Design and Implementation of Combined Secure Hash Algorithm
                  {SHA-512}},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {105--113},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_11},
  doi          = {10.1007/978-3-642-14478-3\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/KayalvizhiSSGV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/KayalvizhiVV10,
  author       = {R. Kayalvizhi and
                  M. Vijayalakshmi and
                  Vaidehi V.},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Energy Analysis of {RSA} and {ELGAMAL} Algorithms for Wireless Sensor
                  Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {172--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_18},
  doi          = {10.1007/978-3-642-14478-3\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/KayalvizhiVV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/KumarBS10,
  author       = {Krishnan Kumar and
                  J. Nafeesa Begum and
                  V. Sumathy},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Efficient Region-Based Key Agreement for Peer -to - Peer Information
                  Sharing in Mobile Ad Hoc Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {280--295},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_29},
  doi          = {10.1007/978-3-642-14478-3\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/KumarBS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/KumarR10,
  author       = {Madhan Kumar Srinivasan and
                  Paul Rodrigues},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Roadmap for the Comparison of Identity Management Solutions Based
                  on State-of-the-Art IdM Taxonomies},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {349--358},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_36},
  doi          = {10.1007/978-3-642-14478-3\_36},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/KumarR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/KumariRS10,
  author       = {D. Aruna Kumari and
                  K. Raja Sekhar Rao and
                  M. Suman},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Privacy Preserving Mining of Distributed Data Using Steganography},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {263--269},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_27},
  doi          = {10.1007/978-3-642-14478-3\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/KumariRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/KundarapCSSDM10,
  author       = {Anuj Kundarap and
                  Arpit Chhajlani and
                  Rashu Singla and
                  Mugdha Sawant and
                  Milind Dere and
                  Parikshit Mahalle},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Security for Contactless Smart Cards Using Cryptography},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {558--566},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_56},
  doi          = {10.1007/978-3-642-14478-3\_56},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/KundarapCSSDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Lamba10,
  author       = {C. S. Lamba},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Security for High-Speed MANs/WANs},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {75--82},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_8},
  doi          = {10.1007/978-3-642-14478-3\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Lamba10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/MahalleBPP10,
  author       = {Parikshit Mahalle and
                  Sachin Babar and
                  Neeli R. Prasad and
                  Ramjee Prasad},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Identity Management Framework towards Internet of Things (IoT): Roadmap
                  and Key Challenges},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {430--439},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_43},
  doi          = {10.1007/978-3-642-14478-3\_43},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/MahalleBPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/MaskeyS10,
  author       = {Niwas Maskey and
                  Gitanjali Sachdeva},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11
                  Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {314--322},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_32},
  doi          = {10.1007/978-3-642-14478-3\_32},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/MaskeyS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Meghanathan10,
  author       = {Natarajan Meghanathan},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Design of a Reliability-based Source Routing Protocol for Wireless
                  Mobile Ad Hoc Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {463--472},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_46},
  doi          = {10.1007/978-3-642-14478-3\_46},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Meghanathan10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/MoizRP10,
  author       = {Salman Abdul Moiz and
                  Lakshmi Rajamani and
                  Supriya N. Pal},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Design and Implementation of Pessimistic Commit Protocols in Mobile
                  Environments},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {603--612},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_61},
  doi          = {10.1007/978-3-642-14478-3\_61},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/MoizRP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Momani10,
  author       = {Mohammad Momani},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Trust Models in Wireless Sensor Networks: {A} Survey},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {37--46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_4},
  doi          = {10.1007/978-3-642-14478-3\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Momani10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/MuniyandiRI10,
  author       = {Amutha Prabakar Muniyandi and
                  Rajaram Ramasamy and
                  Indurani},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A New Remote Mutual Authentication Scheme for {WI-FI} Enabledhand-Held
                  Devices},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {201--213},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_21},
  doi          = {10.1007/978-3-642-14478-3\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/MuniyandiRI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/MuraleedharanP10,
  author       = {N. Muraleedharan and
                  Arun Parmar},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Flow Based Slow and Fast Scan Detection System},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {191--200},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_20},
  doi          = {10.1007/978-3-642-14478-3\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/MuraleedharanP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/MurugesanR10,
  author       = {Raja Kumar Murugesan and
                  Sureswaran Ramadass},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Hybrid Address Allocation Algorithm for IPv6},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {509--517},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_51},
  doi          = {10.1007/978-3-642-14478-3\_51},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/MurugesanR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/NovotnyZ10,
  author       = {Miroslav Novotn{\'{y}} and
                  Filip Zavoral},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {BubbleTrust: {A} Reliable Trust Management for Large {P2P} Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {359--373},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_37},
  doi          = {10.1007/978-3-642-14478-3\_37},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/NovotnyZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/PareekMSCB10,
  author       = {Vikas Pareek and
                  Aditi Mishra and
                  Arpana Sharma and
                  Rashmi Chauhan and
                  Shruti Bansal},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Deviation Based Outlier Intrusion Detection System},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {395--401},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_39},
  doi          = {10.1007/978-3-642-14478-3\_39},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/PareekMSCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/PatelBPPRZ10,
  author       = {Reema Patel and
                  Bhavesh Borisaniya and
                  Avi Patel and
                  Dhiren R. Patel and
                  Muttukrishnan Rajarajan and
                  Andrea Zisman},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Comparative Analysis of Formal Model Checking Tools for Security Protocol
                  Verification},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {152--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_16},
  doi          = {10.1007/978-3-642-14478-3\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/PatelBPPRZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/PaulS10,
  author       = {Mithun Paul and
                  Ashutosh Saxena},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud
                  Computing},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {340--348},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_35},
  doi          = {10.1007/978-3-642-14478-3\_35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/PaulS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/PonnapalliBTV10,
  author       = {Pavan Kumar Ponnapalli and
                  Ramesh Babu Battula and
                  Pavan Kumar Tummala and
                  Srikanth Vemuru},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Wireless Mesh Networks: Routing Protocols and Challenges},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {143--151},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_15},
  doi          = {10.1007/978-3-642-14478-3\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/PonnapalliBTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/RaghuCLJMS10,
  author       = {N. C. Raghu and
                  M. K. Chaithanya and
                  P. R. L. Lakshmi and
                  G. Jyostna and
                  B. Manjulatha and
                  N. Sarat},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Trust Management Framework for Ubiquitous Applications},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {500--508},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_50},
  doi          = {10.1007/978-3-642-14478-3\_50},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/RaghuCLJMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/RajagopalanM10,
  author       = {Narendran Rajagopalan and
                  C. Mala},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Analysis and Comparative Study of Different Backoff Algorithms with
                  Probability Based Backoff Algorithm},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {331--339},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_34},
  doi          = {10.1007/978-3-642-14478-3\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/RajagopalanM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/RajeevG10,
  author       = {Rajeev Tiwari and
                  Gulista Khan},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Load Balancing in Distributed Web Caching},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {47--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_5},
  doi          = {10.1007/978-3-642-14478-3\_5},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/RajeevG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/RajkumarGD10,
  author       = {P. V. Rajkumar and
                  Soumya Kanti Ghosh and
                  Pallab Dasgupta},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Concurrent Usage Control Implementation Verification Using the {SPIN}
                  Model Checker},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {214--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_22},
  doi          = {10.1007/978-3-642-14478-3\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/RajkumarGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/RajuK10,
  author       = {D. V. Naga Raju and
                  V. Valli Kumari},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {{TRING:} {A} New Framework for Efficient Group Key Distribution for
                  Dynamic Groups},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {55--65},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_6},
  doi          = {10.1007/978-3-642-14478-3\_6},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/RajuK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/RameshU10,
  author       = {G. Ramesh and
                  R. Umarani},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Data Security in Local Area Network Based on Fast Encryption Algorithm},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {11--26},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_2},
  doi          = {10.1007/978-3-642-14478-3\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/RameshU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SandhyaM10,
  author       = {M. K. Sandhya and
                  Krishnan Murugan},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_1},
  doi          = {10.1007/978-3-642-14478-3\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/SandhyaM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SangeethaHPVS10,
  author       = {S. Sangeetha and
                  S. Haripriya and
                  S. G. Mohana Priya and
                  Vaidehi V. and
                  N. Srinivasan},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Fuzzy Rule-Base Based Intrusion Detection System on Application Layer},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {27--36},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_3},
  doi          = {10.1007/978-3-642-14478-3\_3},
  timestamp    = {Sun, 31 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/SangeethaHPVS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SchmidR10,
  author       = {Giovanni Schmid and
                  Francesco Rossi},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A-Code: {A} New Crypto Primitive for Securing Wireless Sensor Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {452--462},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_45},
  doi          = {10.1007/978-3-642-14478-3\_45},
  timestamp    = {Fri, 02 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/SchmidR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Selvarani10,
  author       = {D. Roselin Selvarani},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Secured Paradigm for Mobile Databases},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {164--171},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_17},
  doi          = {10.1007/978-3-642-14478-3\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Selvarani10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Sen10,
  author       = {Jaydip Sen},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes
                  in a Peer-to-Peer Wireless Mesh Network},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {528--537},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_53},
  doi          = {10.1007/978-3-642-14478-3\_53},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Sen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/Sen10a,
  author       = {Jaydip Sen},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {538--547},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_54},
  doi          = {10.1007/978-3-642-14478-3\_54},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/Sen10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SharmaG10,
  author       = {Sugam Sharma and
                  Shashi K. Gadia},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {On Analyzing the Degree of Coldness in Iowa, a North Central Region,
                  United States: An {XML} Exploitation in Spatial Databases},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {613--624},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_62},
  doi          = {10.1007/978-3-642-14478-3\_62},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/SharmaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SharmaO10,
  author       = {Anand Sharma and
                  Vibha Ojha},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Privacy Preserving Data Mining by Cyptography},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {576--582},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_58},
  doi          = {10.1007/978-3-642-14478-3\_58},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/SharmaO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SherlySRA10,
  author       = {A. P. Sherly and
                  Sapna Sasidharan and
                  Ashji S. Raj and
                  P. P. Amritha},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Novel Approach for Compressed Video Steganography},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {567--575},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_57},
  doi          = {10.1007/978-3-642-14478-3\_57},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/SherlySRA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/ShreelekshmiWM10,
  author       = {R. Shreelekshmi and
                  M. Wilscy and
                  C. E. Veni Madhavan},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Image Classification for More Reliable Steganalysis},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {66--74},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_7},
  doi          = {10.1007/978-3-642-14478-3\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/ShreelekshmiWM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SubashriAKV10,
  author       = {T. Subashri and
                  R. Arunachalam and
                  B. Gokul Vinoth Kumar and
                  Vaidehi V.},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Pipelining Architecture of {AES} Encryption and Key Generation with
                  Search Based Memory},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {224--231},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_23},
  doi          = {10.1007/978-3-642-14478-3\_23},
  timestamp    = {Sun, 31 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/SubashriAKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SubashriKV10,
  author       = {T. Subashri and
                  B. Gokul Vinoth Kumar and
                  Vaidehi V.},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {132--142},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_14},
  doi          = {10.1007/978-3-642-14478-3\_14},
  timestamp    = {Sun, 31 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsa/SubashriKV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SubbulakshmiSRR10,
  author       = {T. Subbulakshmi and
                  S. Mercy Shalinie and
                  C. Suneel Reddy and
                  A. Ramamoorthi},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Detection and Classification of DDoS Attacks Using Fuzzy Inference
                  System},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {242--252},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_25},
  doi          = {10.1007/978-3-642-14478-3\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/SubbulakshmiSRR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/SunithaA10,
  author       = {N. R. Sunitha and
                  B. B. Amberker},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Proxy Re-signature Scheme That Translates One Type of Signature Scheme
                  to Another Type of Signature Scheme},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {270--279},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_28},
  doi          = {10.1007/978-3-642-14478-3\_28},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/SunithaA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/TakB10,
  author       = {Gaurav Kumar Tak and
                  Vaibhav Bhargava},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Clustering Approach in Speech Phoneme Recognition Based on Statistical
                  Analysis},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {483--489},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_48},
  doi          = {10.1007/978-3-642-14478-3\_48},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/TakB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/TakT10,
  author       = {Gaurav Kumar Tak and
                  Shashikala Tapaswi},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Knowledge Base Compound Approach towards Spam Detection},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {490--499},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_49},
  doi          = {10.1007/978-3-642-14478-3\_49},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/TakT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/TiwaryMK10,
  author       = {Prabhat Kumar Tiwary and
                  Niwas Maskey and
                  Suman Khakurel},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Power Adjustment Approach for Multi-channel Multi-AP Deployment
                  Using Cognitive Radio Concept},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {296--301},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_30},
  doi          = {10.1007/978-3-642-14478-3\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/TiwaryMK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/TripathyDP10,
  author       = {Animesh Tripathy and
                  Subhalaxmi Das and
                  Prashanta Kumar Patra},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {A Framework for Mining Strong Positive and Negative Association Rules
                  of Frequent Objects in Spatial Database System Using Interesting Measure},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {583--592},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_59},
  doi          = {10.1007/978-3-642-14478-3\_59},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/TripathyDP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsa/VijayalakshmiVS10,
  author       = {V. Vijayalakshmi and
                  L. M. Varalakshmi and
                  G. Florence Sudha},
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Efficient Encryption of Intra and Inter Frames in {MPEG} Video},
  booktitle    = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  pages        = {93--104},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3\_10},
  doi          = {10.1007/978-3-642-14478-3\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/VijayalakshmiVS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cnsa/2010,
  editor       = {Natarajan Meghanathan and
                  Selma Boumerdassi and
                  Nabendu Chaki and
                  Dhinaharan Nagamalai},
  title        = {Recent Trends in Network Security and Applications - Third International
                  Conference, {CNSA} 2010, Chennai, India, July 23-25, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {89},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14478-3},
  doi          = {10.1007/978-3-642-14478-3},
  isbn         = {978-3-642-14477-6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsa/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics