Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_8
C. S. Lamba
{"title":"Security for High-Speed MANs/WANs","authors":"C. S. Lamba","doi":"10.1007/978-3-642-14478-3_8","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_8","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_57
A. Sherly, S. Sasidharan, A. S. Raj, P. Amritha
{"title":"A Novel Approach for Compressed Video Steganography","authors":"A. Sherly, S. Sasidharan, A. S. Raj, P. Amritha","doi":"10.1007/978-3-642-14478-3_57","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_57","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_35
Mithun Paul, A. Saxena
{"title":"Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing","authors":"Mithun Paul, A. Saxena","doi":"10.1007/978-3-642-14478-3_35","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_35","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126267493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_34
Narendran Rajagopalan, C. Mala
{"title":"Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm","authors":"Narendran Rajagopalan, C. Mala","doi":"10.1007/978-3-642-14478-3_34","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_34","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_44
Shashi Bhanwar, S. Bawa
{"title":"Reputation Enhancement in a Trust Management System","authors":"Shashi Bhanwar, S. Bawa","doi":"10.1007/978-3-642-14478-3_44","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_44","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_27
D. Kumari, K. R. Rao, M. Suman
{"title":"Privacy Preserving Mining of Distributed Data Using Steganography","authors":"D. Kumari, K. R. Rao, M. Suman","doi":"10.1007/978-3-642-14478-3_27","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_27","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132068146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_61
S. A. Moiz, L. Rajamani, Supriya N. Pal
{"title":"Design and Implementation of Pessimistic Commit Protocols in Mobile Environments","authors":"S. A. Moiz, L. Rajamani, Supriya N. Pal","doi":"10.1007/978-3-642-14478-3_61","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_61","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121168030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_37
M. Novotný, F. Zavoral
{"title":"BubbleTrust: A Reliable Trust Management for Large P2P Networks","authors":"M. Novotný, F. Zavoral","doi":"10.1007/978-3-642-14478-3_37","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_37","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"62 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-07-23DOI: 10.1007/978-3-642-14478-3_54
Jaydip Sen
{"title":"A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks","authors":"Jaydip Sen","doi":"10.1007/978-3-642-14478-3_54","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_54","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129994731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}