| 11 | DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM G. RAMESH1 and R. UMARANI2, 1Thiruvalluvar College of Engineering & Technology, India and 2Sri Sarada college for women, India |
| 14 | FUZZY RULE-BASE BASED INTRUSION DETECTION SYSTEM ON APPLICATION LAYER S.Sangeetha, S.Haripriya, S.G. Mohana Priya, V.Vaidehi, N.Srinivasan Angel College of Engineering and Technology, India |
| 33 | Trust Models in Wireless Sensor Networks: A Survey Mohammad Momani, University of Technology - Sydney, Australia |
| 69 | Load Balancing in Distributed Web Caching Tiwari Rajeev1 and Khan Gulista2, 1HEC - Jagadhri, India. 2MMEC - Mullana, India. |
| 80 | TRING: A New Framework for Efficient Group key Distribution for Dynamic Groups D.V. Naga Raju1, V. Valli Kumari2, 1Nagarjuna University - Guntur, India, 2Andhra University, India. |
| 89 | Image classification for more reliable steganalysis Shreelekshmi R1, M Wilscy1 and C E Veni Madhavan2, 1College of Engineering - Trivandrum, India and 2Indian Institute of Science - Bangalore, India |
| 100 | Security for High-Speed MANs/WANs C S Lamba1 and Pawan Kumar2, 1Rajasthan Institute of Engineering & Technology, India and 2Bikaner Engineering college, India |
| 128 | Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks M.K.Sandhya and K.Murugan, Anna University - Chennai, India |
| 129 | Behavioral Analysis of Transport Layer Based Hybrid Covert Channel Anjan K and Jibi Abraham, M.S.Ramaiah Institute of Technology - Bangalore, India. |
| 141 | Efficient Encryption of Intra and Inter Frames in MPEG Video Vijayalakshmi.v, L.M Varalakshmi, G.F Sudha, Engineering College - Puducherry, India. |
| 144 | VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 R.Kayalvizhi, R.Harihara Subramanian, R.Girish Santhosh, J.Gurubaran and V.Vaidehi, MIT, Anna University - Chennai, India |
| 146 | Performance comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for mobile Adhoc Networks N.Bhalaji1, P.Gurunathan2, A.Shanmugam3, 1Anna University - Coimbatore, India, 2Vels University - Chennai, India. 3Amman Institute of Technology - Bannari, India |
| 148 | A TRUST BASED TECHNIQUE TO ISOLATE NON-FORWARDING NODES IN DSR BASEDMOBILE ADHOC NETWORKS N.Bhalaji1, A.Shanmugam2, 1Anna University - Coimbatore, India, 2Amman Institute of Technology - Bannari, India |
| 156 | Ensured Quality of Admitted Voice Calls Through Authorized VoIP Networks Subashri T, Gokul Vinoth Kumar B and Vaidehi V, Anna University - Chennai, India. |
| 162 | Wireless Mesh Networks: Routing Protocols and Challenges Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala and Srikanth Vemuru KL University - Vaddeswaram, India |
| 165 | Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification Reema Patel1, Bhavesh Borisaniya1, Avi Patel1, Dhiren Patel2, Muttukrishnan Rajarajan3 and Andrea Zisman3, 1Sardar Vallabhbhai National Institute of Technology Surat, India, 2IIT - Gandhinagar, India, 3City University London, UK |
| 188 | Secured Paradigm for Mobile Databases Roselin Selvarani, Holy Cross College - Trichirappalli, India |
| 196 | Energy Analysis of RSA and ELGAMAL Algorithms for wireless Sensor Networks Kayalvizhi.R, Vijayalakshmi.M and Vaidehi.V, MIT, Anna University - Chennai, India |
| 198 | Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET Poonam, K.Garg and M.Misra , IIT Roorkee, India |
| 213 | A flow based Slow and Fast scan detection System Muraleedharan N and Arun Parmar, Electronics City - Bangalore, India |
| 218 | A NEW REMOTE MUTUAL AUTHENTICATION SCHEME FOR WI-FI ENABLEDHAND-HELD DEVICES Amutha Prabakar Muniyandi1, Rajaram Ramasmy1 and Indurani2, 1Thiagarajar College of Engineering, India and 2Alagapa University, India |
| 231 | Concurrent Usage Control Implementation
Verication Using the SPIN Model Checker P.V.Rajkumar, S.K.Ghosh and P.Dasgupta, Indian Institute of Technology - Kharagpur, India |
| 234 | Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory Subashri T, Arunachalam R, Gokul Vinoth Kumar B and Vaidehi V, Anna University – Chennai, India |
| 236 | A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model P Bera 1, Soumya Maity1, S K Ghosh1 and Pallab Dasgupta2, 1 School of Information Technology and 2IIT - Kharagpur, India |
| 241 | Detection And Classification of DDoS Attacks using Fuzzy Inference System T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi Thiagarajar College of Engineering, India |
| 255 | Detection & Recognition of file Masquerading for E-mail and Data Security R.Dhanalakshmi and C.Chellappan, Anna University - Chennai, India |
| 268 | Privacy preserving mining of distributed data using Steganography D.Aruna Kumari, K.Raja Sekhar Rao and M.Suman, K.L.E.F University - Vaddeswaram, INDIA |

