default search action
ACITY 2012: Chennai, India
- Natarajan Meghanathan, Dhinaharan Nagamalai, Nabendu Chaki:
Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1. Advances in Intelligent Systems and Computing 176, Springer 2012, ISBN 978-3-642-31512-1 - P. R. Mahalingam:
Intelligent Network-Based Intrusion Detection System (iNIDS). 1-9 - Tumpa Roy, Poonam Sisodia, Divye Upadhyay, Kamlesh Dutta:
Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password. 11-22 - S. V. Nagaraj:
Securing Multi-agent Systems: A Survey. 23-30 - Gaurav Varshney, Ramesh Chandra Joshi, Anjali Sardana:
Personal Secret Information Based Authentication towards Preventing Phishing Attacks. 31-42 - Premraj Mahajan, Anjali Sardana:
Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis. 43-53 - M. Sasirekha, I. Sumaiya Thaseen, J. Saira Banu:
An Integrated Intrusion Detection System for Credit Card Fraud Detection. 55-60 - Majid Nezakatolhoseini, Sam Jabbehdari, Mohammad Ali Pourmina:
Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems. 61-70 - Ramanuj Chouksey, R. Sivashankari, Piyush Singhai:
ECDLP Based Proxy Multi-signature Scheme. 71-79 - D. Chandramohan, Duggineni Veeraiah, M. Shanmugam, N. Balaji, G. Sambasivam, Shailesh Khapre:
SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues. 81-86 - B. Soniya, M. Wilscy:
Host-Based Bot Detection Using Destination White-Lists for User's Profile. 87-93 - Amish Kumar, Namita Tiwari:
Effective Implementation and Evaluation of AES in Matlab. 95-101 - Priyanka Dey, Suparna Biswas:
Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts. 103-112 - Roger Zahno, Amr M. Youssef:
An Obfuscated Implementation of RC4. 113-129 - Nur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha:
A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders. 131-140 - J. Valarmathi, K. Lakshmi, R. S. Menaga, K. V. Abirami, V. Rhymend Uthariaraj:
SLA for a Pervasive Healthcare Environment. 141-149 - Mayank Kumar Goyal, Alok Aggarwal:
Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment. 151-157 - Sujoy Saha, Rohit Verma, Satadal Sengupta, Vineet Mishra, Subrata Nandi:
SRSnF: A Strategy for Secured Routing in Spray and Focus Routing Protocol for DTN. 159-169 - Shivani Mishra, Krishna Kant, R. S. Yadav:
Multi Tree View of Complex Attack - Stuxnet. 171-188 - Swathi Bhumireddy, Somanath Tripathy, Rakesh Matam:
Secure Peer-Link Establishment in Wireless Mesh Networks. 189-198 - Uttam Kr. Mondal, Jyotsna Kumar Mandal:
Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT). 199-208 - Chaitali Biswas Dutta, Utpal Biswas:
Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV. 209-218 - Ambrish Srivastav, Nitin Hambir:
English to Hindi Machine Translator Using GMT and RBMT Approach. 219-225 - Amit Kumar Srivastava, Arun Kumar Misra:
Plugging DHCP Security Holes Using S-DHCP. 227-238 - Nishant Goswami, Tarulata Chauhan, Nishant Doshi:
Efficient Cryptography Technique on Perturbed Data in Distributed Environment. 239-244 - K. Anitha Kumari, G. Sudha Sadasivam, Bhandari Chetna, S. Rubika:
A Novel Triangle Centroid Authentication Protocol for Cloud Environment. 245-254 - Ahtesham Akhtar Patel, S. Jaya Nirmala, S. Mary Saira Bhanu:
Security and Availability of Data in the Cloud. 255-261 - Shanta Mandal, Rituparna Chaki:
A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks. 263-271 - Pratima Sarkar, Rituparna Chaki:
A Cryptographic Approach towards Black Hole Attack Detection. 273-278 - Bukke Devendra Naik, Sarath Chandra Boddukolu, Pothula Sujatha, P. Dhavachelvan:
Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels. 279-288 - Jagadeesh Kakarla, S. Siva Sathya:
Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc Networks. 289-298 - Mayank Kumar Goyal, Yatendra Kumar Verma, Paras Bassi, Paurush Kumar Misra:
Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission Links. 299-306 - L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai:
Personalised High Quality Search with in a Web Site: No User Profiling. 307-316 - Tulsidas Patil, Ganesh Dattatray Bhutkar, Noshir Tarapore:
Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System. 317-328 - Sundarapandian Vaidyanathan:
Analysis and Synchronization of the Hyperchaotic Yujun Systems via Sliding Mode Control. 329-337 - Aakanksha Pandey, Nilay Khare:
String Matching Technique Based on Hardware: A Comparative Analysis. 339-347 - R. Shyamala, S. Valli:
Impact of Blackhole and Rushing Attack on the Location-Based Routing Protocol for Wireless Sensor Networks. 349-359 - Chandra Thapa, C. Chandrasekhar:
Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular Network. 361-367 - B. Siva Kumar Reddy, M. Sakthi Ganesh, P. Venkata Krishna:
Temporary Parallel Route Recovery for Frequent Link Failure in VANET. 369-374 - Manjusha Karkhanis, Achala Deshmukh:
Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator. 375-383 - Shailaja C. Patil, Ashish Gupta, Mukesh A. Zaveri:
Efficient Target Recovery in Wireless Sensor Network. 385-394 - Soma Bandyopadhyay, Abhijan Bhattacharyya:
Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System. 395-404 - O. S. GnanaPrakasi, P. Varalakshmi:
Improving TCP Performance in Hybrid Networks. 405-415 - Amritha Sampath, C. Tripti:
Synchronization in Distributed Systems. 417-424 - Debajyoti Mukhopadhyay, Sheetal Vij, Suyog Tasare:
NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component. 425-434 - S. Indu Vadhani, G. Vithya, B. Vinayagasundaram:
Quantum DOT Sensor for Image Capturing and Routing Based on Temporal Power and Critical Factor. 435-445 - Suparna Biswas, Sarmistha Neogy:
Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network. 447-456 - Lakshmi Priya, Meenakshi Murugappan, G. Geetha:
Design of Broadband Optical Sources for OCDMA/WDMA Applications. 457-466 - Shailaja C. Patil, Mukesh A. Zaveri:
Localization in Wireless Sensor Network: A Distributed Approach. 467-476 - Shaikh Mohammed Atiq, Dayanand Ingle, B. B. Meshram:
Web Mining and Security in E-commerce. 477-487 - J. Julia, Meenakshi Murugappan:
Performance Improvement in MIMO Systems Using Rotating Codebooks. 489-496 - K. Rahimunnisa, M. Priya Zach, S. Suresh Kumar, J. Jayakumar:
Efficient Techniques for the Implementation of AES SubByte and MixColumn Transformations. 497-506 - Sevil Sen, Zeynep Dogmus:
Feature Selection for Detection of Ad Hoc Flooding Attacks. 507-513 - Nagesha, Sunilkumar S. Manvi:
Performance Analysis of SCTP Compared to TCP and UDP. 515-524 - D. Chandramohan, T. Vengattaraman, M. S. Saleem Basha, P. Dhavachelvan:
MSRCC - Mitigation of Security Risks in Cloud Computing. 525-532 - Sarbani Roy, Nandini Mukherjee:
Topology Construction of 3D Wireless Sensor Network. 533-542 - Kirti Dhwaj, Rachit Garg, Gaurav Mishra, Neetesh Purohit:
Design and Analysis of Dual Capacitively Loaded C-PIFA. 543-550 - Moon Ho Lee, Md. Hashem Ali Khan, Daechul Park:
Jong Nang 3-Input NOR Channel, . 551-562 - Nithin Srinivasan, Sriram Ravichandran, Shruthi Ravichandran, Prabagarane Nagaradjane:
Multiuser Transmitter Preprocessing Aided Downlink Communications in Correlated Frequency-Selective Channels. 563-573 - C. H. Sandhya, Deepali R. Borade, Rinki Sharma, Govind R. Kadambi:
Multi-dimensional Performance Characterization of Directional Antennas for Applications in Energy Efficient Ad-Hoc Network. 575-585 - Rakesh Matam, Somanath Tripathy:
Reliability Enhanced Routing Protocol for Wireless Mesh Networks. 587-596 - Monomita Mazumdar, Srimanta Halder, Prasenjit Chanak, Indrajit Banerjee:
DARIH: Distributed Adaptive Routing via Information Highway in Sensor Network. 597-607 - Preetha Theresa Joy, K. Poulose Jacob:
A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks. 609-619 - Srimanta Halder, Monomita Mazumdar, Prasenjit Chanak, Indrajit Banerjee:
FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor Network. 621-631 - Banda Sreenivas, S. Ramesh Babu, S. Prabhakar, D. Karunakar Reddy:
Effective Resource Allocation Technique for Wireless Cellular System. 633-640 - Rajesh P. Barnwal, Arnab Thakur:
Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots. 641-649 - Payal Chaudhari, Hiteishi M. Diwanji:
Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack. 651-660 - R. Venkadeshan, M. Jegatha:
Super Peer Deployment in Unstructured Peer-to-Peer Networks. 661-669 - Subrata Dutta, Nandini Mukherjee, Monideepa Roy, Sarmistha Neogy:
Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in WSN. 671-683 - Gaurav Sikri, Rajni:
Peak to Average Power Ratio Reduction in OFDM System over PAM, QAM and QPSK Modulation. 685-690 - Ayan Kumar Das, Rituparna Chaki:
MERCC: Multiple Events Routing with Congestion Control for WSN. 691-698 - Gaurav Kumar Tak, Gaurav Ojha:
Awareness Based Approach against E-Mail Attacks. 699-708 - Paras Gupta, Manu Vardhan, Akhil Goel, Abhinav Verma, Dharmender Singh Kushwaha:
On the Fly File Dereplication Mechanism. 709-718 - Durgesh Bajpai, Manu Vardhan, Sachin Gupta, Ravinder Kumar, Dharmender Singh Kushwaha:
Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services. 719-728 - Hemant Hariyale, Manu Vardhan, Ankit Pandey, Ankit Mishra, Dharmender Singh Kushwaha:
Load Balancing in Cluster Using BLCR Checkpoint/Restart. 729-737 - Utpal Nandi, Jyotsna Kumar Mandal:
Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging. 739-748 - Helly Patel, Mahesh P. Wankhade:
Human Tracking in Video Surveillance. 749-756 - Manpreet Kaur, Rajni, Parminder Singh:
Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET. 757-763 - Dipayan Bose, Arnab Banerjee, Aniruddha Bhattacharyya, Himadri Nath Saha, Debika Bhattacharyya, Pranab Kumar Banerjee:
An Efficient Approach to Secure Routing in MANET. 765-776 - Swarnali Hazra, S. K. Setua:
Trust Oriented Secured AODV Routing Protocol against Rushing Attack. 777-788 - Madhumita Mishra, Somanath Tripathy, Sathya Peri:
SEPastry: Security Enhanced Pastry. 789-795 - Koushik Majumder, Sudhabindu Ray, Subir Kumar Sarkar:
Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR. 797-806
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.