Recent Trends in Network Security and Applications

Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings

  • Natarajan Meghanathan
  • Selma Boumerdassi
  • Nabendu Chaki
  • Dhinaharan Nagamalai

Part of the Communications in Computer and Information Science book series (CCIS, volume 89)

Table of contents

  1. Front Matter
  2. The Third International Conference on Network Security and Applications (CNSA 2010)

    1. S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan
      Pages 27-36
    2. Tiwari Rajeev, Khan Gulista
      Pages 47-54
    3. R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan
      Pages 66-74
    4. C. S. Lamba
      Pages 75-82
    5. Koundinya Anjan, Jibi Abraham
      Pages 83-92
    6. V. Vijayalakshmi, L. M. Varalakshmi, G. F. Sudha
      Pages 93-104
    7. R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, V. Vaidehi
      Pages 105-113
    8. T. Subashri, B. Gokul Vinoth Kumar, V. Vaidehi
      Pages 132-142
    9. Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru
      Pages 143-151
    10. Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Muttukrishnan Rajarajan, Andrea Zisman
      Pages 152-163
    11. D. Roselin Selvarani
      Pages 164-171
    12. R. Kayalvizhi, M. Vijayalakshmi, V. Vaidehi
      Pages 172-180

About these proceedings

Introduction

The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: • Network and Wireless Network Security • Mobile, Ad Hoc and Sensor Network Security • Peer-to-Peer Network Security • Database and System Security • Intrusion Detection and Prevention • Internet Security, and Applications Security and Network Management • E-mail Security, Spam, Phishing, E-mail Fraud • Virus, Worms, Trojon Protection • Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) • Ubiquitous Computing Security • Web 2. 0 Security • Cryptographic Protocols • Performance Evaluations of Protocols and Security Application There were 182 submissions to the conference and the Program Committee selected 63 papers for publication. The book is organized as a collection of papers from the First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), the First International Workshop on Database Management Systems (DMS- 2010), and the First International Workshop on Mobile, Wireless and Networks Security (MWNS-2010).

Keywords

LA MP2 Routing Wireless LAN algorithms classification cloud computing cryptography design internet security load balancing sensor networks structured analysis ubiquitous computing verification

Editors and affiliations

  • Natarajan Meghanathan
    • 1
  • Selma Boumerdassi
    • 2
  • Nabendu Chaki
    • 3
  • Dhinaharan Nagamalai
    • 4
  1. 1.Jackson State UniversityJacksonUSA
  2. 2.CNAM / CEDRICParisFrance
  3. 3.University of CalcuttaCalcuttaIndia
  4. 4.Wireilla Net Solutions PTY LtdAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-14478-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-14477-6
  • Online ISBN 978-3-642-14478-3
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • About this book