Abstract is missing.
- Secure Framework for Data Centric Heterogeneous Wireless Sensor NetworksM. K. Sandhya, K. Murugan. 1-10 [doi]
- Data Security in Local Area Network Based on Fast Encryption AlgorithmG. Ramesh, R. Umarani. 11-26 [doi]
- Fuzzy Rule-Base Based Intrusion Detection System on Application LayerS. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan. 27-36 [doi]
- Trust Models in Wireless Sensor Networks: A SurveyMohammad Momani. 37-46 [doi]
- Load Balancing in Distributed Web CachingRajeev Tiwari, Gulista Khan. 47-54 [doi]
- TRING: A New Framework for Efficient Group Key Distribution for Dynamic GroupsD. V. Naga Raju, V. Valli Kumari. 55-65 [doi]
- Image Classification for More Reliable SteganalysisR. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan. 66-74 [doi]
- Behavioral Analysis of Transport Layer Based Hybrid Covert ChannelKoundinya Anjan, Jibi Abraham. 83-92 [doi]
- Efficient Encryption of Intra and Inter Frames in MPEG VideoV. Vijayalakshmi, L. M. Varalakshmi, G. Florence Sudha. 93-104 [doi]
- VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, V. Vaidehi. 105-113 [doi]
- Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc NetworksN. Bhalaji, P. Gurunathan, A. Shanmugam. 114-122 [doi]
- A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc NetworksN. Bhalaji, A. Shanmugam. 123-131 [doi]
- Ensured Quality of Admitted Voice Calls through Authorized VoIP NetworksT. Subashri, B. Gokul Vinoth Kumar, V. Vaidehi. 132-142 [doi]
- Wireless Mesh Networks: Routing Protocols and ChallengesPavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru. 143-151 [doi]
- Comparative Analysis of Formal Model Checking Tools for Security Protocol VerificationReema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Muttukrishnan Rajarajan, Andrea Zisman. 152-163 [doi]
- Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor NetworksR. Kayalvizhi, M. Vijayalakshmi, V. Vaidehi. 172-180 [doi]
- Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANETPoonam Gera, Kumkum Garg, Manoj Misra. 181-190 [doi]
- A Flow Based Slow and Fast Scan Detection SystemN. Muraleedharan, Arun Parmar. 191-200 [doi]
- A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held DevicesAmutha Prabakar Muniyandi, Rajaram Ramasamy, Indurani. 201-213 [doi]
- Concurrent Usage Control Implementation Verification Using the SPIN Model CheckerP. V. Rajkumar, Soumya Kanti Ghosh, Pallab Dasgupta. 214-223 [doi]
- Pipelining Architecture of AES Encryption and Key Generation with Search Based MemoryT. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, V. Vaidehi. 224-231 [doi]
- A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC ModelPadmalochan Bera, Soumya Maity, Soumya Kanti Ghosh, Pallab Dasgupta. 232-241 [doi]
- Detection and Classification of DDoS Attacks Using Fuzzy Inference SystemT. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi. 242-252 [doi]
- Detection and Recognition of File Masquerading for E-mail and Data SecurityRanaganayakulu Dhanalakshmi, Chenniappan Chellappan. 253-262 [doi]
- Privacy Preserving Mining of Distributed Data Using SteganographyD. Aruna Kumari, K. Raja Sekhar Rao, M. Suman. 263-269 [doi]
- Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature SchemeN. R. Sunitha, B. B. Amberker. 270-279 [doi]
- Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc NetworksKrishnan Kumar, J. Nafeesa Begum, V. Sumathy. 280-295 [doi]
- A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio ConceptPrabhat Kumar Tiwary, Niwas Maskey, Suman Khakurel. 296-301 [doi]
- Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social MalaiseAnkur Gupta. 302-313 [doi]
- Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 NetworksNiwas Maskey, Gitanjali Sachdeva. 314-322 [doi]
- Privacy Layer for Business IntelligenceVishal Gupta, Ashutosh Saxena. 323-330 [doi]
- Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff AlgorithmNarendran Rajagopalan, C. Mala. 331-339 [doi]
- Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud ComputingMithun Paul, Ashutosh Saxena. 340-348 [doi]
- A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM TaxonomiesSrinivasan Madhan Kumar, Paul Rodrigues. 349-358 [doi]
- BubbleTrust: A Reliable Trust Management for Large P2P NetworksMiroslav Novotný, Filip Zavoral. 359-373 [doi]
- Dynamic Policy Adaptation for Collaborative GroupsMadhumita Chatterjee, G. Sivakumar. 374-394 [doi]
- A Deviation Based Outlier Intrusion Detection SystemVikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, Shruti Bansal. 395-401 [doi]
- Privacy Preserving Ciphertext Policy Attribute Based EncryptionA. Balu, K. Kuppusamy. 402-409 [doi]
- Reliable Timeout Based Commit ProtocolBharati Harsoor, Sumalatha Ramachandram. 410-419 [doi]
- Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli R. Prasad, Ramjee Prasad. 420-429 [doi]
- Identity Management Framework towards Internet of Things (IoT): Roadmap and Key ChallengesParikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad. 430-439 [doi]
- Reputation Enhancement in a Trust Management SystemShashi Bhanwar, Seema Bawa. 440-451 [doi]
- A-Code: A New Crypto Primitive for Securing Wireless Sensor NetworksGiovanni Schmid, Francesco Rossi. 452-462 [doi]
- Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc NetworksNatarajan Meghanathan. 463-472 [doi]
- Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc NetworksJyoti Grover, Deepak Kumar, M. Sargurunathan, Manoj Singh Gaur, Vijay Laxmi. 473-482 [doi]
- Clustering Approach in Speech Phoneme Recognition Based on Statistical AnalysisGaurav Kumar Tak, Vaibhav Bhargava. 483-489 [doi]
- Knowledge Base Compound Approach towards Spam DetectionGaurav Kumar Tak, Shashikala Tapaswi. 490-499 [doi]
- Trust Management Framework for Ubiquitous ApplicationsN. C. Raghu, M. K. Chaithanya, P. R. L. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat. 500-508 [doi]
- A Hybrid Address Allocation Algorithm for IPv6Raja Kumar Murugesan, Sureswaran Ramadass. 509-517 [doi]
- Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing ProtocolsDeepak Dembla, Yogesh Chaba. 518-527 [doi]
- Towards Designing Application Specific Trust Treated ModelFarag Azzedin, Sajjad Mahmood. 548-557 [doi]
- Security for Contactless Smart Cards Using CryptographyAnuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, Parikshit Mahalle. 558-566 [doi]
- A Novel Approach for Compressed Video SteganographyA. P. Sherly, Sapna Sasidharan, Ashji S. Raj, P. P. Amritha. 567-575 [doi]
- Privacy Preserving Data Mining by CyptographyAnand Sharma, Vibha Ojha. 576-582 [doi]
- A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting MeasureAnimesh Tripathy, Subhalaxmi Das, Prashanta Kumar Patra. 583-592 [doi]
- Global Search Analysis of Spatial Gene Expression Data Using Genetic AlgorithmM. Anandhavalli, M. K. Ghose, K. Gauthaman, M. Boosha. 593-602 [doi]
- Design and Implementation of Pessimistic Commit Protocols in Mobile EnvironmentsSalman Abdul Moiz, Lakshmi Rajamani, Supriya N. Pal. 603-612 [doi]
- On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial DatabasesSugam Sharma, Shashi K. Gadia. 613-624 [doi]
- Implementation of MPEG-7 Document Management System Based on Native DatabaseByeong-Tae Ahn. 625-634 [doi]