The Third International Conference on Network Security & Applications (CNSA-2010)

Venue: The Park Hotels,
July 23 ~ 25, 2010, Chennai, India.


Program Schedule

Accepted Papers

11 DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM
G. RAMESH1 and R. UMARANI2, 1Thiruvalluvar College of Engineering & Technology, India and
2Sri Sarada college for women, India
14 FUZZY RULE-BASE BASED INTRUSION DETECTION SYSTEM ON APPLICATION LAYER
S.Sangeetha, S.Haripriya, S.G. Mohana Priya, V.Vaidehi, N.Srinivasan
Angel College of Engineering and Technology, India
33 Trust Models in Wireless Sensor Networks: A Survey
Mohammad Momani, University of Technology - Sydney, Australia
69 Load Balancing in Distributed Web Caching
Tiwari Rajeev1 and Khan Gulista2, 1HEC - Jagadhri, India. 2MMEC - Mullana, India.
80 TRING: A New Framework for Efficient Group key Distribution for Dynamic Groups
D.V. Naga Raju1, V. Valli Kumari2, 1Nagarjuna University - Guntur, India, 2Andhra University, India.
89 Image classification for more reliable steganalysis
Shreelekshmi R1, M Wilscy1 and C E Veni Madhavan2, 1College of Engineering - Trivandrum, India and 2Indian Institute of Science - Bangalore, India
100 Security for High-Speed MANs/WANs
C S Lamba1 and Pawan Kumar2, 1Rajasthan Institute of Engineering & Technology, India and 2Bikaner Engineering college, India
128 Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks
M.K.Sandhya and K.Murugan, Anna University - Chennai, India
129 Behavioral Analysis of Transport Layer Based Hybrid Covert Channel
Anjan K and Jibi Abraham, M.S.Ramaiah Institute of Technology - Bangalore, India.
141 Efficient Encryption of Intra and Inter Frames in MPEG Video
Vijayalakshmi.v, L.M Varalakshmi, G.F Sudha, Engineering College - Puducherry, India.
144 VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512
R.Kayalvizhi, R.Harihara Subramanian, R.Girish Santhosh, J.Gurubaran and V.Vaidehi, MIT, Anna University - Chennai, India
146 Performance comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for mobile Adhoc Networks
N.Bhalaji1, P.Gurunathan2, A.Shanmugam3, 1Anna University - Coimbatore, India, 2Vels University - Chennai, India. 3Amman Institute of Technology - Bannari, India
148 A TRUST BASED TECHNIQUE TO ISOLATE NON-FORWARDING NODES IN DSR BASEDMOBILE ADHOC NETWORKS
N.Bhalaji1, A.Shanmugam2, 1Anna University - Coimbatore, India, 2Amman Institute of Technology - Bannari, India
156 Ensured Quality of Admitted Voice Calls Through Authorized VoIP Networks
Subashri T, Gokul Vinoth Kumar B and Vaidehi V, Anna University - Chennai, India.
162 Wireless Mesh Networks: Routing Protocols and Challenges
Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala and Srikanth Vemuru
KL University - Vaddeswaram, India
165 Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification
Reema Patel1, Bhavesh Borisaniya1, Avi Patel1, Dhiren Patel2, Muttukrishnan Rajarajan3 and Andrea Zisman3, 1Sardar Vallabhbhai National Institute of Technology Surat, India, 2IIT - Gandhinagar, India, 3City University London, UK
188 Secured Paradigm for Mobile Databases
Roselin Selvarani, Holy Cross College - Trichirappalli, India
196 Energy Analysis of RSA and ELGAMAL Algorithms for wireless Sensor Networks
Kayalvizhi.R, Vijayalakshmi.M and Vaidehi.V, MIT, Anna University - Chennai, India
198 Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET
Poonam, K.Garg and M.Misra , IIT Roorkee, India
213 A flow based Slow and Fast scan detection System
Muraleedharan N and Arun Parmar, Electronics City - Bangalore, India
218 A NEW REMOTE MUTUAL AUTHENTICATION SCHEME FOR WI-FI ENABLEDHAND-HELD DEVICES
Amutha Prabakar Muniyandi1, Rajaram Ramasmy1 and Indurani2, 1Thiagarajar College of Engineering, India and 2Alagapa University, India
231 Concurrent Usage Control Implementation Veri cation Using the SPIN Model Checker
P.V.Rajkumar, S.K.Ghosh and P.Dasgupta, Indian Institute of Technology - Kharagpur, India
234 Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory
Subashri T, Arunachalam R, Gokul Vinoth Kumar B and Vaidehi V, Anna University Chennai, India
236 A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model
P Bera 1, Soumya Maity1, S K Ghosh1 and Pallab Dasgupta2, 1 School of Information Technology and 2IIT - Kharagpur, India
241 Detection And Classification of DDoS Attacks using Fuzzy Inference System
T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi
Thiagarajar College of Engineering, India
255 Detection & Recognition of file Masquerading for E-mail and Data Security
R.Dhanalakshmi and C.Chellappan, Anna University - Chennai, India
268 Privacy preserving mining of distributed data using Steganography
D.Aruna Kumari, K.Raja Sekhar Rao and M.Suman, K.L.E.F University - Vaddeswaram, INDIA