T. Subbulakshmi, S. Shalinie, C. S. Reddy, A. Ramamoorthi
{"title":"Detection and Classification of DDoS Attacks Using Fuzzy Inference System","authors":"T. Subbulakshmi, S. Shalinie, C. S. Reddy, A. Ramamoorthi","doi":"10.1007/978-3-642-14478-3_25","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_25","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133557269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups","authors":"D. Raju, Valli Kumari Vatsavayi","doi":"10.1007/978-3-642-14478-3_6","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_6","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131044574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks","authors":"T. Subashri, B. Kumar, V. Vaidehi","doi":"10.1007/978-3-642-14478-3_14","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_14","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115147448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept","authors":"Prabhat Kumar Tiwary, Niwas Maskey, S. Khakurel","doi":"10.1007/978-3-642-14478-3_30","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_30","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116154969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image Classification for More Reliable Steganalysis","authors":"R. Shreelekshmi, M. Wilscy, C. Madhavan","doi":"10.1007/978-3-642-14478-3_7","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_7","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122899613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme","authors":"N. Sunitha, B. B. Amberker","doi":"10.1007/978-3-642-14478-3_28","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_28","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116827781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Kayalvizhi, R. Subramanian, R. Santhosh, J. Gurubaran, V. Vaidehi
{"title":"VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512","authors":"R. Kayalvizhi, R. Subramanian, R. Santhosh, J. Gurubaran, V. Vaidehi","doi":"10.1007/978-3-642-14478-3_11","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_11","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116978982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Flow Based Slow and Fast Scan Detection System","authors":"N. Muraleedharan, Arun Parmar","doi":"10.1007/978-3-642-14478-3_20","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_20","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132487975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases","authors":"Sugam Sharma, S. Gadia","doi":"10.1007/978-3-642-14478-3_62","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_62","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}