| Hall - 3 |
July 13, 2012 |
| Time |
Session 1
Chair : Nabendu Chaki, University of Calcutta, India |
| 08:00 -
09:00AM |
Registration |
| 08:30 -
09:00AM |
Welcome Message & Invited Talk : Dr. Nabendu Chaki, University of Calcutta, India
|
| 09:00 -
09:20AM |
Key Distribution Schemes in Wireless Sensor Networks: Novel classification and Analysis (Premraj Mahajan and Anjali Sardana) |
| 09:20 -
09:40AM |
SVIP-Enhanced Security Mechanism for SIP based VoIP Systems and its Issues ( D.Chandramohan and Shailesh Khapre ) |
| 09:40 -
10:00AM |
Multi Tree View of Complex Attack - Stuxnet ( Shivani Mishra, Krishna Kant and R.S Yadav ) |
| 10:00 - 10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Security and Availability of Data in the CloudÂ
( Ahtesham Akhtar Patel, S.Jaya Nirmala and S.Mary Saira Bhanu ) |
10.40 -
11.00AM
|
Temporary Parallel Route Recovery for Frequent Link Failure in VANET
( B.Siva kumar reddy, M.Sakthi ganesh and P.Venkata krishna ) |
11.00 -
11.20AM
|
Design of Broadband Optical Sources for WDM Applications
( Lakshmi Priya, M. Meenakshi and G. Geetha ) |
11.20 -
11.40AM
|
NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component
( Debajyoti Mukhopadhyay, Sheetal Vij and Suyog Tasare ) |
11.40 -
12.00PM
|
MSRCC- Mitigation of Security Risks in Cloud Computing ( D.Chandramohan and Shailesh Khapre ) |
| 12.00 -
12.20PM |
A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks ( Preetha Theresa Joy and K.Polouse Jacob ) |
| 12.20 -
01.40PM |
-----------Lunch
Break----------- |
| Time |
Session 2
Chair : Soma Bandyopadhyay, Tata Consultancy Services - Kolkata, India Shivani Mishra, MNNIT Allahabad, India |
1.40 -
2.00PM
|
Performance Analysis of AODV and DSDV Protocols using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots
( Rajesh P Barnwal and Arnab Thakur ) |
2.00 -
2.20PM
|
A Statistical Pattern Mining Approach for Identifying Wireless ( Nur Al Hasan Haldar, Muhammad Abulaish and Syed Asim Pasha ) |
2.20 -
2.40PM
|
Connecting Entropy-Based Detection methods and Entropy to Detect Covert Timing Channels
( Bukke Devendra Naik,Pothula Sujatha and P.Dhavachelvan ) |
2.40 -
3.00PM
|
Personalised High Quality Search with in a Web Site : No User Profiling  ( L.K. Joshila Grace, V.Maheswari and Dhinaharan Nagamalai ) |
3.00 -
3.20PM
|
Securing Multi-agent Systems: A survey and Assessment
( S.V.Nagaraj ) |
| 3.20 -
3.40PM |
Host-based Bot Detection using destination white-lists for user's profile ( Soniya BÂ and Wilscy M ) |
| 3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts ( Priyanka Dey and Suparna Biswas ) |
4.20 -
4.40PM
|
SLA for a Pervasive Healthcare Environment ( Valarmathi J , Lakshmi K , Menaga R.S and Abirami K.V ) |
4.40 -
5.00PM
|
Dynamic Topology Construction of 3D Wireless Sensor Network ( Sarbani Roy and Nandini Mukherjee ) |
5.00 -
5.20PM
|
Secure Peer-Link Establishment in Wireless Mesh Networks
( Swathi Bhumireddy, Somanath Tripathy and Rakesh Matam ) |
5.20 -
5.40PM
|
Plugging DHCP Security Holes Using S-DHCP ( Amit Kumar Srivastava and Arun Kumar Misra ) |
| 5.40 -
6.00PM |
A Novel Triangle Centroid Authentication Protocol For Cloud Environment
( AnithaKumari K, SudhaSadasivam G, Bhandari Chetna and Jeevan F R ) |
| |
June 14, 2012 |
| Time |
Session 3
Chair : Sundarapandian Vaidyanathan, Vel Tech Dr. RR & Dr. SR Technical University, India Sarbani Roy, Jadavpur University, India |
| 08:00 -
08:20AM |
Personal Secret Information Based Authentication Towards Preventing Phishing Attacks ( Gaurav Varshney, Anjali Sardana ) |
| 08:20 -
08:40AM |
An Integrated Intrusion Detection System For Credit Card Fraud Detection ( M.Sasirekha, Sumaiya Thaseen.I and Saira Banu J ) |
| 08:40 -
09:00AM |
Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV ( Chaitali Biswas Dutta and Utpal Biswas ) |
| 09:00 -
09:20AM |
A Novel power balanced encryption scheme for secure information exchange in Wireless Sensor Networks ( Shanta Mandal and Rituparna Chaki ) |
| 09:20 -
09:40AM |
Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode Control
( Sundarapandian Vaidyanathan ) |
| 09:40 -
10:00AM |
Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi radio Vehicular Ad-hoc Networks
( Jagadeesh Kakarla, S Siva Sathya and Ramesh Babu B ) |
| 10:00 -
10:20AM |
-------------Break-------------- |
10.20 -
10.40AM
|
Designing Usability Heuristics for Intrusion Detection System ( Tulsidas Patil, Ganesh Bhutkar and Noshir Tarapore ) |
10.40 -
11.00AM
|
A Cryptographic Approach Towards Black Hole Attack Detection ( Pratima sarkar and Rituparna Chaki ) |
11.00 -
11.20AM
|
Performance Analysis of SCTP compared to TCP and UDP ( Nagesha and Sunilkumar S.Manvi ) |
11.20 -
11.40AM
|
Analysis of Fractional Frequency Reuse (FFR) Over Classical Reuse Scheme in 4G (LTE) Cellular Network ( Chandra Thapa and Chandrasekhar.C ) |
11.40 -
12.00PM
|
Analysis of MIMO channel Characteristics in Indoor Environment using Ray Tracing Simulator ( Manjusha Karkhanis and Achala Deshmukh ) |
| 12.00 -
12.20PM |
Feature Selection for Detection of Ad Hoc Flooding Attacks ( Sevil Sen and Zeynep Dogmus ) |
| 12.20 -
01.40PM |
-----------Lunch
Break----------- |
| Time |
Session 4
Chair : Achala Deshmukh, Sinhgad College of Engineering, India Rajesh P Barnwal, CSIR-CMERI Durgapur, India |
1.40 -
2.00PM
|
Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System
( Soma Bandyopadhyay and Abhijan Bhattacharyya ) |
2.00 -
2.20PM
|
Improving TCP Performance in Hybrid Networks ( GnanaPrakasi O.S, Gokul Subramanian, Nizha Shree Seenivasan, Vanathi Kathirvelu and Varalakshmi.p ) |
2.20 -
2.40PM
|
Quantum Dot Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor
( Induvadhani.S, B.Vinayagasundaram and G.Vithya ) |
2.40 -
3.00PM
|
Performance Improvement In MIMO Systems Using Rotating Codebooks ( Julia J and M.Meenakshi ) |
3.00 -
3.20PM
|
Efficient Technique for the Implementation of AES Subbyte and Mixcolumn Transformation
( M. Priya Zach, K. Rahimunnisa and S. Suresh Kumar ) |
| 3.20 -
3.40PM |
Peak to Average Power Ratio Reduction in OFDM System over PAM, QAM and QPSK modulation ( Rajni and Gaurav Sikri ) |
| 3.40 - 4.00PM |
-----------Break----------- |
4.00 -
4.20PM
|
SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for Delay Tolerant Networks ( Sujoy Saha, Satadal Sengupta, Rohit Verma and Subrata Nandi ) |
4.20 -
4.40PM
|
Analysis and Performance Evaluation of Application Specific Processors for Network-based Intrusion Detection Systems ( Majid Nezakatolhoseini,Sam Jabbehdari and Mohammad Ali Pourmina ) |
4.40 -
5.00PM
|
Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks ( Shyamala Ramachandran and Valli Shanmugam ) |
5.00
- 5.20PM
|
Jong Nang 3-Input Nor Channel Â
( Moon Ho Lee ) |
5.20 -
5.40PM
|
Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channel Â
( Nithin Srinivasan, Sriram Ravichandran, Shruthi Ravichandran and Prabagarane Nagaradjane ) |
| 5.40 -
6.00PM |
Reliability Enhanced Routing Protocol for Wireless Mesh Networks Â
( Rakesh Matam and Somanath Tripathy ) |
| |
|