Co-located with Third International Conference on Network Security & Applications (CNSA-2010)

       

ON July 23~25, 2010, CHENNAI, INDIA

VENUE:THE PARK HOTELS

 

 Registered Papers List

4 -- Proxy Re-signature Scheme that translates one type of Signature Scheme to another type of Signature scheme
Sunitha N.R1 and Bharat Amberker2,1Siddaganga Institute of Technology,India,2National Institute of Technology - Warangal, India

5 -- Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks
K.Kumar1,J.Nafeesa Begum1 and V.Sumathy2,1Government College of Engineering - Bargur,India,2Government College of Technology - Coimbatore,India

6 -- A Power Adjustment Approach for Multi-Channel Multi-AP Deployment Using Cognitive Radio Concept
Prabhat Kumar Tiwary, Niwas Maskey and Suman Khakurel, NIT - Surat, India

9 -- Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise
Ankur Gupta,Model Institute of Engineering and Technology, India

14 -- Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks
Niwas Maskey and Gitanjali Sachdeva, SVNIT, India

15 -- Privacy Layer for Business Intelligence
Vishal Gupta and Ashutosh Saxena, Infosys Technologies Limited - Hyderabad, India

17 -- ANALYSIS AND COMPARATIVE STUDY OF DIFFERENT BACKOFF ALGORITHMS WITH PROBABILITY BASED BACKOFF ALGORITHM
C.MALA and Narendran Rajagopalan,National Institute of Technology - Trichy, India

18 -- Proof of Erasability For Ensuring Comprehensive Data Deletion In Cloud Computing
Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India

21 -- A roadmap for the comparison of identity management solutions based on state-of-the-art IdM taxonomies
Madhan Kumar Srinivasan1 and Paul Rodrigues2,1Infosys Technologies, Mysore, India and 2Hindustan University, India

23 -- BubbleTrust: A Reliable Trust Management for Large P2P Networks
Miroslav Novotny and Filip Zavoral, Charles University in Prague,Czech Republic

24 -- Dynamic Policy Adaptation for Collaborative Groups
Madhumita Chatterjee and G Sivakumar, Indian Institute of Technology - Bombay, India

28 -- A Deviation Based Outlier Intrusion Detection System
Vikas Pareek, Aditi Mishra, Rashmi Chauhan, Shruti Bansal and Arpana Sharma, Banasthali University, India

29 -- Privacy preserving Ciphertext policy Attribute based Encryption
Balu Achimuthu, Alagappa University, India

30 -- Reliable timeout based commit protocol
BHARATI HARSOOR and Ramachandram Sirandas,Osmania University, India

31 -- Proposed Security Model and Threat Taxonomy for IoT
Sachin Babar, Parikshit Mahalle, Neeli Prasad and Ramjee Prasad, Aalborg University, Denmark

32 -- Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges
Parikshit Mahalle,Neeli Prasad and Ramjee Prasad, Aalborg University, Denmark

34 -- Reputation enhancement in a Trust management System
Shashi Bhanwar, Thapar University, India

37 -- A-Code: A New Crypto Primitive for securing Wireless Sensor Networks
Giovanni Schmid1 and Francesco Rossi2, 1High Performance Computing and Networking Institute (ICAR) and 2University of Neaples Parthenope, Italy

40 -- Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad hoc Networks
Natarajan Meghanathan, Jackson State University, USA

46 -- Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
JYOTI GROVER, Manoj Gaur,Sargurunathan M,Deepak Kumar and Vijay Laxmi, Malaviya National Institute of Technology, India

47 -- Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis
Gaurav Tak and Vaibhav Bhargava, ABV-Indian Institute Of Information Technology & Management, India

48 -- Knowledge Base Compound approach towards Spam Detection
Gaurav Tak and Shashikala Tapaswi, ABV-Indian Institute Of Information Technology & Management, India

49 -- Trust Management Framework for Ubiquitous Applications
Raghu N.C, Chaithanya M.K,Lakshmi Eswari P.R,Jyostna G, Manju Latha, Sarat Chandra Babu N, CDAC - Hyderabad, India

50 -- A Hybrid Address Allocation Algorithm for IPv6
Raja Kumar Murugesan and Sureswaran Ramadass, Universiti Sains Malaysia, Malaysia

52 -- Modeling and Performance analysis of Efficient & Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols
DEEPAK DEMBLA1 and yogesh chaba2, 1AIET, Jaipur India and 2GJU of Science & Technology, India

53 -- A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network
Jaydip Sen, Tata Consultancy Services Ltd., India

54 -- A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
Jaydip Sen, Tata Consultancy Services Ltd., India

55 -- Towards Designing Application Specific Trust Treated Model
Farag Azzedin and SAJJAD MAHMOOD, King Fahd University of Petroleum and Minerals, Saudi Arabia



 Accepted Papers List

4 -- Proxy Re-signature Scheme that translates one type of Signature Scheme to another type of Signature scheme
Sunitha N.R1 and Bharat Amberker2,1Siddaganga Institute of Technology,India,2National Institute of Technology - Warangal, India

5 -- Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks
K.Kumar1,J.Nafeesa Begum1 and V.Sumathy2,1Government College of Engineering - Bargur,India,2Government College of Technology - Coimbatore,India

6 -- A Power Adjustment Approach for Multi-Channel Multi-AP Deployment Using Cognitive Radio Concept
Prabhat Kumar Tiwary, Niwas Maskey and Suman Khakurel, NIT - Surat, India

9 -- Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise
Ankur Gupta,Model Institute of Engineering and Technology, India

10 -- Information Management System Using Mobile Phones in Wireless Sensor Network
Debnath Bhattacharyya1, kheyali Mitra2, Tai-hoon Kim1 and Samir Bandyopadhyay3,1Hannam University, South Korea,2Heritage Institute of Technology, India, 3University of Calcutta, India

11 -- Symmetric Cryptosystem for Information Security
Debnath Bhattacharyya1,Samir Kumar Bandyopadhyay2,Somaditya Roy2 and Tai-hoon Kim1,1Hannam University, South Korea,2University of Calcutta, India

13 -- TasteBuddy-based Version Selection Strategy for BitTorrent Users against Content Pollution
An'an Luo, Chuang Lin and Liqin Tian, Tsinghua University, China

14 -- Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks
Niwas Maskey and Gitanjali Sachdeva, SVNIT, India

15 -- Privacy Layer for Business Intelligence
Vishal Gupta and Ashutosh Saxena, Infosys Technologies Limited - Hyderabad, India

17 -- ANALYSIS AND COMPARATIVE STUDY OF DIFFERENT BACKOFF ALGORITHMS WITH PROBABILITY BASED BACKOFF ALGORITHM
C.MALA and Narendran Rajagopalan,National Institute of Technology - Trichy, India

18 -- Proof of Erasability For Ensuring Comprehensive Data Deletion In Cloud Computing
Mithun Paul and Ashutosh Saxena, Infosys Technologies Ltd - Hyderabad, India

19 -- Implementation of a generalized trust framework over mobile ad hoc networks
Revathi Venkataraman and T.Rama Rao, SRM University, India

21 -- A roadmap for the comparison of identity management solutions based on state-of-the-art IdM taxonomies
Madhan Kumar Srinivasan1 and Paul Rodrigues2,1Infosys Technologies, Mysore, India and 2Hindustan University, India

22 -- Extended Secure Data Communication Using Blind Source Separation, Linear Feedback Shift Register and Chaos
Anil Kumar, Sikkim Manipal Institute Technoloy, India

23 -- BubbleTrust: A Reliable Trust Management for Large P2P Networks
Miroslav Novotny and Filip Zavoral, Charles University in Prague,Czech Republic

24 -- Dynamic Policy Adaptation for Collaborative Groups
Madhumita Chatterjee and G Sivakumar, Indian Institute of Technology - Bombay, India

28 -- A Deviation Based Outlier Intrusion Detection System
Vikas Pareek, Aditi Mishra, Rashmi Chauhan, Shruti Bansal and Arpana Sharma, Banasthali University, India

29 -- Privacy preserving Ciphertext policy Attribute based Encryption
Balu Achimuthu, Alagappa University, India

30 -- Reliable timeout based commit protocol
BHARATI HARSOOR and Ramachandram Sirandas,Osmania University, India

31 -- Proposed Security Model and Threat Taxonomy for IoT
Sachin Babar, Parikshit Mahalle, Neeli Prasad and Ramjee Prasad, Aalborg University, Denmark

32 -- Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges
Parikshit Mahalle,Neeli Prasad and Ramjee Prasad, Aalborg University, Denmark

33 -- Behavior Profile-Based Detector of Colluding Peers in P2P Trust System
Guangsheng Miao, Dengguo Feng, Purui Su and Lingyun Ying, Chinese Academy of Sciences, China

34 -- Reputation enhancement in a Trust management System
Shashi Bhanwar, Thapar University, India

37 -- A-Code: A New Crypto Primitive for securing Wireless Sensor Networks
Giovanni Schmid1 and Francesco Rossi2, 1High Performance Computing and Networking Institute (ICAR) and 2University of Neaples Parthenope, Italy

40 -- Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad hoc Networks
Natarajan Meghanathan, Jackson State University, USA

41 -- The LabVIEW Simulation of Space-Time Coding Technique in the MIMO-OFDM System
Jiancai Liu, Nanjing University, China

42 -- Wireless Security Measurement Using Data Value Index
Reza Amirpoor1, ajay kumar2 and satish R. Deavne3, 1Bharati Vidyapeeth University, India, 2JSPM’s JAYAWANT Institute of Computer Applications, India and 3Dr. D. Y. Patil Ramrao Adik Institute of Technology, India

46 -- Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
JYOTI GROVER, Manoj Gaur,Sargurunathan M,Deepak Kumar and Vijay Laxmi, Malaviya National Institute of Technology, India

47 -- Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis
Gaurav Tak and Vaibhav Bhargava, ABV-Indian Institute Of Information Technology & Management, India

48 -- Knowledge Base Compound approach towards Spam Detection
Gaurav Tak and Shashikala Tapaswi, ABV-Indian Institute Of Information Technology & Management, India

49 -- Trust Management Framework for Ubiquitous Applications
Raghu N.C, Chaithanya M.K,Lakshmi Eswari P.R,Jyostna G, Manju Latha, Sarat Chandra Babu N, CDAC - Hyderabad, India

50 -- A Hybrid Address Allocation Algorithm for IPv6
Raja Kumar Murugesan and Sureswaran Ramadass, Universiti Sains Malaysia, Malaysia

51 -- An Application of PANA Protocol in Mobile IPv6
Noumita Dehariya, Shri G.S.Institute of Technoly and Science, India

52 -- Modeling and Performance analysis of Efficient & Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols
DEEPAK DEMBLA1 and yogesh chaba2, 1AIET, Jaipur India and 2GJU of Science & Technology, India

53 -- A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network
Jaydip Sen, Tata Consultancy Services Ltd., India

54 -- A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks
Jaydip Sen, Tata Consultancy Services Ltd., India

55 -- Towards Designing Application Specific Trust Treated Model
Farag Azzedin and SAJJAD MAHMOOD, King Fahd University of Petroleum and Minerals, Saudi Arabia