000 07135nam a22004095i 4500
001 301357
003 MX-SnUAN
005 20160429155706.0
007 cr nn 008mamaa
008 150903s2010 gw | o |||| 0|eng d
020 _a9783642144783
_99783642144783
024 7 _a10.1007/9783642144783
_2doi
035 _avtls000355431
039 9 _a201509030956
_bVLOAD
_c201405060350
_dVLOAD
_y201402191043
_zstaff
040 _aMX-SnUAN
_bspa
_cMX-SnUAN
_erda
050 4 _aTK5105.5-5105.9
100 1 _aMeghanathan, Natarajan.
_eeditor.
_9317900
245 1 0 _aRecent Trends in Network Security and Applications :
_bThird International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings /
_cedited by Natarajan Meghanathan, Selma Boumerdassi, Nabendu Chaki, Dhinaharan Nagamalai.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2010.
300 _a651 páginas 286 ilustraciones
_brecurso en línea.
336 _atexto
_btxt
_2rdacontent
337 _acomputadora
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _aarchivo de texto
_bPDF
_2rda
490 0 _aCommunications in Computer and Information Science,
_x1865-0929 ;
_v89
500 _aSpringer eBooks
505 0 _aThe Third International Conference on Network Security and Applications (CNSA 2010) -- Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks -- Data Security in Local Area Network Based on Fast Encryption Algorithm -- Fuzzy Rule-Base Based Intrusion Detection System on Application Layer -- Trust Models in Wireless Sensor Networks: A Survey -- Load Balancing in Distributed Web Caching -- TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups -- Image Classification for More Reliable Steganalysis -- Security for High-Speed MANs/WANs -- Behavioral Analysis of Transport Layer Based Hybrid Covert Channel -- Efficient Encryption of Intra and Inter Frames in MPEG Video -- VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 -- Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks -- A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks -- Ensured Quality of Admitted Voice Calls through Authorized VoIP Networks -- Wireless Mesh Networks: Routing Protocols and Challenges -- Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification -- Secured Paradigm for Mobile Databases -- Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks -- Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET -- A Flow Based Slow and Fast Scan Detection System -- A New Remote Mutual Authentication Scheme for WI-FI Enabledhand-Held Devices -- Concurrent Usage Control Implementation Verification Using the SPIN Model Checker -- Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory -- A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model -- Detection and Classification of DDoS Attacks Using Fuzzy Inference System -- Detection and Recognition of File Masquerading for E-mail and Data Security -- Privacy Preserving Mining of Distributed Data Using Steganography -- First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P -- Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme -- Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks -- A Power Adjustment Approach for Multi-channel Multi-AP Deployment Using Cognitive Radio Concept -- Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise -- Analysis of 802.11 Based Cognitive Networks and Cognitive Based 802.11 Networks -- Privacy Layer for Business Intelligence -- Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm -- Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing -- A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies -- BubbleTrust: A Reliable Trust Management for Large P2P Networks -- Dynamic Policy Adaptation for Collaborative Groups -- A Deviation Based Outlier Intrusion Detection System -- Privacy Preserving Ciphertext Policy Attribute Based Encryption -- Reliable Timeout Based Commit Protocol -- Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) -- Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges -- Reputation Enhancement in a Trust Management System -- A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks -- Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks -- Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks -- Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis -- Knowledge Base Compound Approach towards Spam Detection -- Trust Management Framework for Ubiquitous Applications -- A Hybrid Address Allocation Algorithm for IPv6 -- Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols -- A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network -- A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks -- Towards Designing Application Specific Trust Treated Model -- First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010 -- Security for Contactless Smart Cards Using Cryptography -- A Novel Approach for Compressed Video Steganography -- Privacy Preserving Data Mining by Cyptography -- A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure -- Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm -- Design and Implementation of Pessimistic Commit Protocols in Mobile Environments -- On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases -- Implementation of MPEG-7 Document Management System Based on Native Database.
520 _aThis book constitutes the proceedings of the Third International Conference on Network Security and Applications held in Chennai, India, in July 2010.
590 _aPara consulta fuera de la UANL se requiere clave de acceso remoto.
700 1 _aBoumerdassi, Selma.
_eeditor.
_9338215
700 1 _aChaki, Nabendu.
_eeditor.
_9317899
700 1 _aNagamalai, Dhinaharan.
_eeditor.
_9317901
710 2 _aSpringerLink (Servicio en línea)
_9299170
776 0 8 _iEdición impresa:
_z9783642144776
856 4 0 _uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-14478-3
_zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL)
942 _c14
999 _c301357
_d301357