Recent Trends in Network Security and Applications

Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings

  • Natarajan Meghanathan
  • Selma Boumerdassi
  • Nabendu Chaki
  • Dhinaharan Nagamalai
Conference proceedings CNSA 2010

Part of the Communications in Computer and Information Science book series (CCIS, volume 89)

Table of contents

  1. Front Matter
  2. The Third International Conference on Network Security and Applications (CNSA 2010)

    1. S. Sangeetha, S. Haripriya, S. G. Mohana Priya, V. Vaidehi, N. Srinivasan
      Pages 27-36
    2. Tiwari Rajeev, Khan Gulista
      Pages 47-54
    3. R. Shreelekshmi, M. Wilscy, C. E. Veni Madhavan
      Pages 66-74
    4. C. S. Lamba
      Pages 75-82
    5. Koundinya Anjan, Jibi Abraham
      Pages 83-92
    6. V. Vijayalakshmi, L. M. Varalakshmi, G. F. Sudha
      Pages 93-104
    7. R. Kayalvizhi, R. Harihara Subramanian, R. Girish Santhosh, J. Gurubaran, V. Vaidehi
      Pages 105-113
    8. T. Subashri, B. Gokul Vinoth Kumar, V. Vaidehi
      Pages 132-142
    9. Pavan Kumar Ponnapalli, Ramesh Babu Battula, Pavan Kumar Tummala, Srikanth Vemuru
      Pages 143-151
    10. Reema Patel, Bhavesh Borisaniya, Avi Patel, Dhiren Patel, Muttukrishnan Rajarajan, Andrea Zisman
      Pages 152-163
    11. D. Roselin Selvarani
      Pages 164-171
    12. R. Kayalvizhi, M. Vijayalakshmi, V. Vaidehi
      Pages 172-180
    13. N. Muraleedharan, Arun Parmar
      Pages 191-200
    14. Amutha Prabakar Muniyandi, Rajaram Ramasmy, Indurani
      Pages 201-213
    15. P. V. Rajkumar, S. K. Ghosh, P. Dasgupta
      Pages 214-223
    16. T. Subashri, R. Arunachalam, B. Gokul Vinoth Kumar, V. Vaidehi
      Pages 224-231
    17. T. Subbulakshmi, S. Mercy Shalinie, C. Suneel Reddy, A. Ramamoorthi
      Pages 242-252
    18. D. Aruna Kumari, K. Raja Sekhar Rao, M. Suman
      Pages 263-269
  3. First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P

    1. Prabhat Kumar Tiwary, Niwas Maskey, Suman Khakurel
      Pages 296-301
    2. Vishal Gupta, Ashutosh Saxena
      Pages 323-330
    3. Miroslav Novotny, Filip Zavoral
      Pages 359-373
    4. Madhumita Chatterjee, G. Sivakumar
      Pages 374-394
    5. Vikas Pareek, Aditi Mishra, Arpana Sharma, Rashmi Chauhan, Shruti Bansal
      Pages 395-401
    6. Bharati Harsoor, S. Ramachandram
      Pages 410-419
    7. Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, Ramjee Prasad
      Pages 420-429
    8. Parikshit Mahalle, Sachin Babar, Neeli R. Prasad, Ramjee Prasad
      Pages 430-439
    9. Shashi Bhanwar, Seema Bawa
      Pages 440-451
    10. Giovanni Schmid, Francesco Rossi
      Pages 452-462
    11. Jyoti Grover, Deepak Kumar, M. Sargurunathan, M. S. Gaur, Vijay Laxmi
      Pages 473-482
    12. Gaurav Kumar Tak, Shashikala Tapaswi
      Pages 490-499

About these proceedings


The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: • Network and Wireless Network Security • Mobile, Ad Hoc and Sensor Network Security • Peer-to-Peer Network Security • Database and System Security • Intrusion Detection and Prevention • Internet Security, and Applications Security and Network Management • E-mail Security, Spam, Phishing, E-mail Fraud • Virus, Worms, Trojon Protection • Security Threats and Countermeasures (DDoS, MiM, Session Hijacking, Replay attack etc. ) • Ubiquitous Computing Security • Web 2. 0 Security • Cryptographic Protocols • Performance Evaluations of Protocols and Security Application There were 182 submissions to the conference and the Program Committee selected 63 papers for publication. The book is organized as a collection of papers from the First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010), the First International Workshop on Database Management Systems (DMS- 2010), and the First International Workshop on Mobile, Wireless and Networks Security (MWNS-2010).


LA MP2 Routing Wireless LAN algorithms classification cloud computing cryptography design internet security load balancing sensor networks structured analysis ubiquitous computing verification

Editors and affiliations

  • Natarajan Meghanathan
    • 1
  • Selma Boumerdassi
    • 2
  • Nabendu Chaki
    • 3
  • Dhinaharan Nagamalai
    • 4
  1. 1.Jackson State UniversityJacksonUSA
  2. 2.CNAM / CEDRICParisFrance
  3. 3.University of CalcuttaCalcuttaIndia
  4. 4.Wireilla Net Solutions PTY LtdAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-642-14477-6
  • Online ISBN 978-3-642-14478-3
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site
Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences