


default search action
ACITY 2012: Chennai, India
- Natarajan Meghanathan

, Dhinaharan Nagamalai, Nabendu Chaki
:
Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1. Advances in Intelligent Systems and Computing 176, Springer 2012, ISBN 978-3-642-31512-1 - P. R. Mahalingam

:
Intelligent Network-Based Intrusion Detection System (iNIDS). 1-9 - Tumpa Roy, Poonam Sisodia, Divye Upadhyay, Kamlesh Dutta:

Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password. 11-22 - S. V. Nagaraj

:
Securing Multi-agent Systems: A Survey. 23-30 - Gaurav Varshney, Ramesh Chandra Joshi, Anjali Sardana:

Personal Secret Information Based Authentication towards Preventing Phishing Attacks. 31-42 - Premraj Mahajan, Anjali Sardana:

Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis. 43-53 - M. Sasirekha, I. Sumaiya Thaseen, J. Saira Banu:

An Integrated Intrusion Detection System for Credit Card Fraud Detection. 55-60 - Majid Nezakatolhoseini, Sam Jabbehdari

, Mohammad Ali Pourmina
:
Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems. 61-70 - Ramanuj Chouksey, R. Sivashankari, Piyush Singhai:

ECDLP Based Proxy Multi-signature Scheme. 71-79 - D. Chandramohan

, Duggineni Veeraiah, M. Shanmugam
, N. Balaji, G. Sambasivam
, Shailesh Khapre
:
SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues. 81-86 - B. Soniya, M. Wilscy:

Host-Based Bot Detection Using Destination White-Lists for User's Profile. 87-93 - Amish Kumar, Namita Tiwari

:
Effective Implementation and Evaluation of AES in Matlab. 95-101 - Priyanka Dey, Suparna Biswas:

Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts. 103-112 - Roger Zahno, Amr M. Youssef:

An Obfuscated Implementation of RC4. 113-129 - Nur Al Hasan Haldar

, Muhammad Abulaish
, Syed Asim Pasha:
A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders. 131-140 - J. Valarmathi

, K. Lakshmi, R. S. Menaga, K. V. Abirami, V. Rhymend Uthariaraj:
SLA for a Pervasive Healthcare Environment. 141-149 - Mayank Kumar Goyal

, Alok Aggarwal
:
Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment. 151-157 - Sujoy Saha, Rohit Verma

, Satadal Sengupta, Vineet Mishra, Subrata Nandi:
SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN. 159-169 - Shivani Mishra, Krishna Kant, R. S. Yadav:

Multi Tree View of Complex Attack - Stuxnet. 171-188 - Swathi Bhumireddy, Somanath Tripathy

, Rakesh Matam:
Secure Peer-Link Establishment in Wireless Mesh Networks. 189-198 - Uttam Kr. Mondal

, Jyotsna Kumar Mandal
:
Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT). 199-208 - Chaitali Biswas Dutta, Utpal Biswas:

Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV. 209-218 - Ambrish Srivastav

, Nitin Hambir:
English to Hindi Machine Translator Using GMT and RBMT Approach. 219-225 - Amit Kumar Srivastava, Arun Kumar Misra:

Plugging DHCP Security Holes Using S-DHCP. 227-238 - Nishant Goswami, Tarulata Chauhan, Nishant Doshi:

Efficient Cryptography Technique on Perturbed Data in Distributed Environment. 239-244 - K. Anitha Kumari

, G. Sudha Sadasivam
, Bhandari Chetna, S. Rubika:
A Novel Triangle Centroid Authentication Protocol for Cloud Environment. 245-254 - Ahtesham Akhtar Patel, S. Jaya Nirmala

, S. Mary Saira Bhanu:
Security and Availability of Data in the Cloud. 255-261 - Shanta Mandal, Rituparna Chaki:

A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks. 263-271 - Pratima Sarkar, Rituparna Chaki:

A Cryptographic Approach towards Black Hole Attack Detection. 273-278 - Bukke Devendra Naik, Sarath Chandra Boddukolu, Pothula Sujatha

, P. Dhavachelvan:
Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels. 279-288 - Jagadeesh Kakarla, S. Siva Sathya:

Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc Networks. 289-298 - Mayank Kumar Goyal

, Yatendra Kumar Verma, Paras Bassi, Paurush Kumar Misra:
Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission Links. 299-306 - L. K. Joshila Grace

, V. Maheswari
, Dhinaharan Nagamalai:
Personalised High Quality Search with in a Web Site: No User Profiling. 307-316 - Tulsidas Patil, Ganesh Dattatray Bhutkar, Noshir Tarapore:

Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System. 317-328 - Sundarapandian Vaidyanathan

:
Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode Control. 329-337 - Aakanksha Pandey, Nilay Khare

:
String Matching Technique Based on Hardware: A Comparative Analysis. 339-347 - R. Shyamala, S. Valli:

Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks. 349-359 - Chandra Thapa

, C. Chandrasekhar:
Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular Network. 361-367 - B. Siva Kumar Reddy, M. Sakthi Ganesh

, P. Venkata Krishna
:
Temporary Parallel Route Recovery for Frequent Link Failure in VANET. 369-374 - Manjusha Karkhanis, Achala Deshmukh:

Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator. 375-383 - Shailaja C. Patil

, Ashish Gupta, Mukesh A. Zaveri:
Efficient Target Recovery in Wireless Sensor Network. 385-394 - Soma Bandyopadhyay, Abhijan Bhattacharyya:

Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System. 395-404 - O. S. GnanaPrakasi, P. Varalakshmi:

Improving TCP Performance in Hybrid Networks. 405-415 - Amritha Sampath, C. Tripti

:
Synchronization in Distributed Systems. 417-424 - Debajyoti Mukhopadhyay

, Sheetal Vij, Suyog Tasare:
NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component. 425-434 - S. Indu Vadhani, G. Vithya

, B. Vinayagasundaram:
Quantum DOT Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor. 435-445 - Suparna Biswas, Sarmistha Neogy:

Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network. 447-456 - Lakshmi Priya, Meenakshi Murugappan

, G. Geetha:
Design of Broadband Optical Sources for OCDMA/WDMA Applications. 457-466 - Shailaja C. Patil

, Mukesh A. Zaveri:
Localization in Wireless Sensor Network: A Distributed Approach. 467-476 - Shaikh Mohammed Atiq, Dayanand Ingle, B. B. Meshram:

Web Mining and Security in E-commerce. 477-487 - J. Julia, Meenakshi Murugappan

:
Performance Improvement in MIMO Systems Using Rotating Codebooks. 489-496 - K. Rahimunnisa, M. Priya Zach, S. Suresh Kumar, J. Jayakumar:

Efficient Techniques for the Implementation of AES SubByte and MixColumn Transformations. 497-506 - Sevil Sen

, Zeynep Dogmus:
Feature Selection for Detection of Ad Hoc Flooding Attacks. 507-513 - Nagesha

, Sunilkumar S. Manvi:
Performance Analysis of SCTP Compared to TCP and UDP. 515-524 - D. Chandramohan

, T. Vengattaraman
, M. S. Saleem Basha
, P. Dhavachelvan:
MSRCC - Mitigation of Security Risks in Cloud Computing. 525-532 - Sarbani Roy

, Nandini Mukherjee:
Topology Construction of 3D Wireless Sensor Network. 533-542 - Kirti Dhwaj, Rachit Garg, Gaurav Mishra, Neetesh Purohit:

Design and Analysis of Dual Capacitively Loaded C-PIFA. 543-550 - Moon Ho Lee, Md. Hashem Ali Khan, Daechul Park:

Jong Nang 3-Input NOR Channel, . 551-562 - Nithin Srinivasan, Sriram Ravichandran, Shruthi Ravichandran, Prabagarane Nagaradjane:

Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channels. 563-573 - C. H. Sandhya, Deepali R. Borade, Rinki Sharma

, Govind R. Kadambi:
Multi-dimensional Performance Characterization of Directional Antennas for Applications in Energy Efficient Ad-Hoc Network. 575-585 - Rakesh Matam, Somanath Tripathy

:
Reliability Enhanced Routing Protocol for Wireless Mesh Networks. 587-596 - Monomita Mazumdar, Srimanta Halder, Prasenjit Chanak

, Indrajit Banerjee
:
DARIH: Distributed Adaptive Routing via Information Highway in Sensor Network. 597-607 - Preetha Theresa Joy, K. Poulose Jacob:

A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks. 609-619 - Srimanta Halder, Monomita Mazumdar, Prasenjit Chanak

, Indrajit Banerjee
:
FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor Network. 621-631 - Banda Sreenivas, S. Ramesh Babu, S. Prabhakar, D. Karunakar Reddy:

Effective Resource Allocation Technique for Wireless Cellular System. 633-640 - Rajesh P. Barnwal

, Arnab Thakur:
Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots. 641-649 - Payal Chaudhari, Hiteishi M. Diwanji

:
Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack. 651-660 - R. Venkadeshan, M. Jegatha:

Super Peer Deployment in Unstructured Peer-to-Peer Networks. 661-669 - Subrata Dutta

, Nandini Mukherjee, Monideepa Roy, Sarmistha Neogy:
Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in WSN. 671-683 - Gaurav Sikri, Rajni:

Peak to Average Power Ratio Reduction in OFDM System over PAM, QAM and QPSK Modulation. 685-690 - Ayan Kumar Das, Rituparna Chaki:

MERCC: Multiple Events Routing with Congestion Control for WSN. 691-698 - Gaurav Kumar Tak, Gaurav Ojha:

Awareness Based Approach against E-Mail Attacks. 699-708 - Paras Gupta, Manu Vardhan

, Akhil Goel, Abhinav Verma, Dharmender Singh Kushwaha:
On the Fly File Dereplication Mechanism. 709-718 - Durgesh Bajpai, Manu Vardhan

, Sachin Gupta, Ravinder Kumar, Dharmender Singh Kushwaha:
Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services. 719-728 - Hemant Hariyale, Manu Vardhan

, Ankit Pandey, Ankit Mishra, Dharmender Singh Kushwaha:
Load Balancing in Cluster Using BLCR Checkpoint/Restart. 729-737 - Utpal Nandi

, Jyotsna Kumar Mandal
:
Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging. 739-748 - Helly Patel, Mahesh P. Wankhade:

Human Tracking in Video Surveillance. 749-756 - Manpreet Kaur, Rajni, Parminder Singh:

Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET. 757-763 - Dipayan Bose, Arnab Banerjee, Aniruddha Bhattacharyya, Himadri Nath Saha, Debika Bhattacharyya, Pranab Kumar Banerjee:

An Efficient Approach to Secure Routing in MANET. 765-776 - Swarnali Hazra, S. K. Setua:

Trust Oriented Secured AODV Routing Protocol against Rushing Attack. 777-788 - Madhumita Mishra

, Somanath Tripathy
, Sathya Peri:
SEPastry: Security Enhanced Pastry. 789-795 - Koushik Majumder

, Sudhabindu Ray, Subir Kumar Sarkar:
Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR. 797-806

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














