Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_59
A. Tripathy, Subhalaxmi Das, P. Patra
{"title":"A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure","authors":"A. Tripathy, Subhalaxmi Das, P. Patra","doi":"10.1007/978-3-642-14478-3_59","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_59","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122747534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_46
N. Meghanathan
{"title":"Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks","authors":"N. Meghanathan","doi":"10.1007/978-3-642-14478-3_46","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_46","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116212046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_43
P. Mahalle, S. Babar, N. Prasad, R. Prasad
{"title":"Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges","authors":"P. Mahalle, S. Babar, N. Prasad, R. Prasad","doi":"10.1007/978-3-642-14478-3_43","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_43","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_42
S. Babar, P. Mahalle, Antonietta Stango, N. Prasad, R. Prasad
{"title":"Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)","authors":"S. Babar, P. Mahalle, Antonietta Stango, N. Prasad, R. Prasad","doi":"10.1007/978-3-642-14478-3_42","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_42","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121680646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_50
N. Raghu, M. Chaithanya, P. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat
{"title":"Trust Management Framework for Ubiquitous Applications","authors":"N. Raghu, M. Chaithanya, P. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat","doi":"10.1007/978-3-642-14478-3_50","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_50","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131541355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_52
D. Dembla, Y. Chaba
{"title":"Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols","authors":"D. Dembla, Y. Chaba","doi":"10.1007/978-3-642-14478-3_52","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_52","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114684917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_10
V. Vijayalakshmi, L. M. Varalakshmi, G. Sudha
{"title":"Efficient Encryption of Intra and Inter Frames in MPEG Video","authors":"V. Vijayalakshmi, L. M. Varalakshmi, G. Sudha","doi":"10.1007/978-3-642-14478-3_10","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_10","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133380672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_22
P. Rajkumar, S. Ghosh, P. Dasgupta
{"title":"Concurrent Usage Control Implementation Verification Using the SPIN Model Checker","authors":"P. Rajkumar, S. Ghosh, P. Dasgupta","doi":"10.1007/978-3-642-14478-3_22","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_22","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116102045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_19
Poonam Gera, K. Garg, M. Misra
{"title":"Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET","authors":"Poonam Gera, K. Garg, M. Misra","doi":"10.1007/978-3-642-14478-3_19","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_19","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125207787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}