Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_60
M. Anandhavalli, M. Ghose, K. Gauthaman, M. Boosha
{"title":"Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm","authors":"M. Anandhavalli, M. Ghose, K. Gauthaman, M. Boosha","doi":"10.1007/978-3-642-14478-3_60","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_60","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127885222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_24
P. Bera, Soumyadev Maity, S. Ghosh, P. Dasgupta
{"title":"A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model","authors":"P. Bera, Soumyadev Maity, S. Ghosh, P. Dasgupta","doi":"10.1007/978-3-642-14478-3_24","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_24","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128382555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_33
Vishal Gupta, A. Saxena
{"title":"Privacy Layer for Business Intelligence","authors":"Vishal Gupta, A. Saxena","doi":"10.1007/978-3-642-14478-3_33","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_33","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122622205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_12
N. Bhalaji, P. Gurunathan, A. Shanmugam
{"title":"Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks","authors":"N. Bhalaji, P. Gurunathan, A. Shanmugam","doi":"10.1007/978-3-642-14478-3_12","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_12","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129935400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_16
Reema Patel, Bhavesh Borisaniya, Avi Patel, D. Patel, M. Rajarajan, A. Zisman
{"title":"Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification","authors":"Reema Patel, Bhavesh Borisaniya, Avi Patel, D. Patel, M. Rajarajan, A. Zisman","doi":"10.1007/978-3-642-14478-3_16","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_16","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_17
D. Selvarani
{"title":"Secured Paradigm for Mobile Databases","authors":"D. Selvarani","doi":"10.1007/978-3-642-14478-3_17","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_17","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"16 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_48
G. Tak, V. Bhargava
{"title":"Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis","authors":"G. Tak, V. Bhargava","doi":"10.1007/978-3-642-14478-3_48","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_48","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123756058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_36
Madhan Kumar Srinivasan, P. Rodrigues
{"title":"A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies","authors":"Madhan Kumar Srinivasan, P. Rodrigues","doi":"10.1007/978-3-642-14478-3_36","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_36","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}