Advertisement

Advances in Network Security and Applications

4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011

  • David C. Wyld
  • Michal Wozniak
  • Nabendu Chaki
  • Natarajan Meghanathan
  • Dhinaharan Nagamalai
Conference proceedings CNSA 2011

Part of the Communications in Computer and Information Science book series (CCIS, volume 196)

Table of contents

  1. Front Matter
  2. Network Security and Applications

    1. P. Jhansi Rani, M. Sambasiva Rao, S. Durga Bhavani
      Pages 43-52
    2. Sandeep Romana, Swapnil Phadnis, Himanshu Pareek, P. R. L. Eswari
      Pages 65-77
    3. Shamal M. Firake, Pravin Soni, B. B. Meshram
      Pages 78-88
    4. Govind Kumar Jha, Neeraj Kumar, Himanshu Sharma, K. G. Sharma
      Pages 89-99
    5. P. Kola Sujatha, R. Arun, P. V. Shanthoosh, I. Ezra Prince Jebahar, A. Kannan
      Pages 113-122
    6. B. Vijayalakshmi, V. Subbiah Bharathi
      Pages 123-130
    7. F. A. Barbhuiya, N. Hubballi, S. Biswas, S. Nandi
      Pages 131-139
    8. D. Shravani, P. Suresh Varma, B. Padmaja Rani, M. Upendra Kumar, A. V. Krishna Prasad
      Pages 140-149
    9. Manas Ku. Dasmohapatra, Kamalika Datta, Indranil Sengupta
      Pages 157-166
    10. Sandip Dutta, Soubhik Chakraborty, N. C. Mahanti
      Pages 178-183
    11. Dhaval Modi, Harsh Sitapara, Rahul Shah, Ekata Mehul, Pinal Engineer
      Pages 184-193
    12. K. Rahimunnisa, Rincy Merrin Varkey, S. Sureshkumar
      Pages 194-203
    13. B. Srinivasa Rao, S. D. V. Prasad
      Pages 214-224
    14. M. Nesa Sudha, Sapna E. John, M. L. Valarmathi
      Pages 225-238
    15. Sreelatha Malempati, Shashi Mogalla
      Pages 239-248
    16. B. Lydia Elizabeth, S. Sudha, A. John Prakash, V. Rhymend Uthariaraj
      Pages 249-257
    17. G. Bansal, N. Kumar, F. A. Barbhuiya, S. Biswas, S. Nandi
      Pages 258-267
    18. Tapolina Bhattasali, Rituparna Chaki
      Pages 268-280
    19. Vengala Satish Kumar, Tanima Dutta, Arijit Sur, Sukumar Nandi
      Pages 281-291
    20. Abhay Nath Singh, Shiv Kumar, R. C. Joshi
      Pages 292-301
    21. V. R. Venkatasubramani, M. Surendar, S. Rajaram
      Pages 320-330
    22. M. Azath, R. S. D. Wahida Banu, A. Neela Madheswari
      Pages 356-363
    23. Preeti Sachan, Pabitra Mohan Khilar
      Pages 364-373
    24. Sainath Gupta, Pruthvi Sabbu, Siddhartha Varma, Suryakanth V. Gangashetty
      Pages 374-382
    25. Vipul Patel, Radhesh Mohandas, Alwyn Pais
      Pages 383-392
    26. T. P. Surekha, T. Ananthapadmanabha, C. Puttamadappa, A. P. Kavya
      Pages 393-401
    27. Khalid Nasr, Anas Abou El Kalam, Christian Fraboul
      Pages 402-413
    28. William K. Moses Jr., C. Pandu Rangan
      Pages 414-426
    29. V. Anjana Devi, R. S. Bhuvaneswaran
      Pages 427-440
    30. Anupam Tarsauliya, Rahul Kala, Ritu Tiwari, Anupam Shukla
      Pages 463-471
    31. G. Geetha, C. Jayakumar
      Pages 472-482
    32. Mohanavalli Seetha Subramanian, Sheila Anand
      Pages 483-488
    33. G. Dileep Kumar, Manohar Gosul
      Pages 489-496
    34. S. Sree Vivek, S. Sharmila Deva Selvi, V. Radhakishan, C. Pandu Rangan
      Pages 502-512

About these proceedings

Introduction

This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers address all technical and practical aspects of security and its applications for wired and wireless networks and are organized in topical sections on network security and applications, ad hoc, sensor and ubiquitous computing, as well as peer-to-peer networks and trust management.

Keywords

cloud computing elliptic curve cryptography internet security system security wireless network security

Editors and affiliations

  • David C. Wyld
    • 1
  • Michal Wozniak
    • 2
  • Nabendu Chaki
    • 3
  • Natarajan Meghanathan
    • 4
  • Dhinaharan Nagamalai
    • 5
  1. 1.Southeastern Louisiana UniversityHammondUSA
  2. 2.Chair of Systems and Computer NetworksWroclaw University of TechnologyWroclawPoland
  3. 3.University of CalcuttaCalcuttaIndia
  4. 4.Jackson State UniversityJacksonUSA
  5. 5.Wireilla Net Solutions PTY LtdMelbourneAustralia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-22540-6
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-22539-0
  • Online ISBN 978-3-642-22540-6
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site