Part 1 / The Third International Conference on Network Security and Applications (CNSA 2010)
, R. Umarani
: Data Security in Local Area Network Based on Fast Encryption Algorithm.
, A. Shanmugam
: A Trust Based Technique to Isolate Non-forwarding Nodes in DSR Basedmobile Adhoc Networks.
Part 2 / First International Workshop on Trust Management in P2P Systems (IWTMP2PS 2010) P2P
N. R. Sunitha
, B. B. Amberker
: Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type of Signature Scheme.
: Conscience-Based Routing in P2P Networks: Preventing Copyright Violations and Social Malaise.
, C. Mala
: Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm.
, K. Kuppusamy
: Privacy Preserving Ciphertext Policy Attribute Based Encryption.
: Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks.
, Yogesh Chaba
: Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols.
: A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network.
: A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks.
Part 3 / First International Workshop on Database Management Systems (DMS 2010) and MWNS 2010
, Shashi K. Gadia
: On Analyzing the Degree of Coldness in Iowa, a North Central Region, United States: An XML Exploitation in Spatial Databases.
: Implementation of MPEG-7 Document Management System Based on Native Database.