Accepted Papers
008 Secure Key Exchange and Encryption Mechanism for Ad Hoc Networks
B. Upendra & S. Sumathy ,VIT University,Inida
010 Perceptual Features based Isolated Digit and Continuous Speech Recognition using Iterative Clustering Approach
A.Revathi, Dr. Y. Venkataramani ,Saranathan College of Engg., Trichy,Inida
011 Performance of Dominating Sets in AODV Routing protocol for MANETs
A Nagaraju*,B. Eswar ,JNTU,India
012 PhishNet: Enhancing the Security Aspect of IMS Users
Reshmi Maulik, Nabendu Chaki ,University of Calcutta,India
016 vertical handoff in heterogeneous wireless mobile networks
C.B.Hebbi and S.V.Saboji ,National Institute of Technology, Durgapur, India
017 Dynamic buffer allocation – A new approach to reduce buffer size at receiver in VCAT enabled Next Generation SDH Networks
, Barkatullah university institute of technology,BU,Bhopal
021 Intelligent Clustering in Wireless sensor Networks
Ehsan Heidari, Ali Movaghar , Islamic Azad University (Doroud Branch Sharif University of Technology Iran
026 A Pascal Graph Property and Computer Network Topology
Sanjay Kumar Pal,Subhrendu Guha Neogi & Samar Sen Sarma ,University of Calcutta
029 IPSTORAGE: CASE STUDY
Somayaji Siva Rama Krishnan, Ch.A.S.Murty ,VIT University, CDAC India
030 Just Queueing: Scheduling Mechnism for the Internet
Yaser Miaji and Suhaidi Hassan ,Universtiy Utara Malaysia,Malaysia
033 Performance Study of Large Block FEC with Drop Tail for Video Streaming over the Internet
Omar Almomani, Osman Ghazali, Suhaidi Hassan ,Universiti Utara Malaysia Malaysia
036 High performance Image Steganalysis through stego sensitive feature selection using MBEGA
S.Geetha, Siva S.Sivatha Sindhu and Dr.N.Kamaraj ,TCE,India
046 Impact of sink mobility on network performance in wireless sensor networks
K.THANIGAIVELU & K.Murugan ,Anna University Chennai, India,
047 A Practical Approach for Planning WLAN Deployment under
3G Cellular Network
Samir K Sadhukhan,Swarup Mandal2 & Debashis Saha ,Indian Institute of Management Calcutta, India, 2Wipro Technologies Kolkata, India
048 A novel algorithm for graded precision localization in wireless sensor networks
S. Sarangi, S. Kar , Indian Institute of Technology, Delhi, India
049 Fault Analysis of Security Policy Implementations in Enterprise Networks
P Bera, Pallab Dasguptay and S K Ghosh , Indian Institute of Technology, Kharagpur, India
050 MSTBBN: M-way Search Tree Based Base station to Node Communication Protocol for Wireless Sensor Networks
Pankaj Gupta,Tarun Bansal,Manoj Misra , Indian Institute of Technology, Roorkee, India
053 ENERGY EFFICIENT WIRELESS SENSOR MAC PROTOCOL FOR COLLISION AVOIDANCE
Abhishek Samanta, Dripto Bakshi , Jadhavpur University, India
055 On-body Packet Routing Algorithms for Body Sensor Networks
Muhannad Quwaider, Subir Biswas , Michigan State University USA
056 End-to-End Network Delay-Constrained for QoS Multicast Routing
Balakannan S.P, Yier Yan, Jae Seung Yang and Moon Ho Lee , Institute of Information and Communication Chonbuk National University, Jeonju, Korea
058 Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication
A.John Prakash and V.Rhymend Uthariaraj , Anna University Chennai, India
059 Planning and Analysis Tool for Large Scale Deployment of Wireless Sensor
Apala Ray , ABB,India
061 A SCHEDULING POLICY FOR BATTERY MANAGEMENT IN MOBILE DEVICES
B.Malarkodi, B.Prasana and B.Venkataramani , National Institute of Technology, Tiruchirappalli
066 AN ATTACK VECTOR FOR DECEPTION THROUGH PERSUASION USED BY HACKERS AND CRAKERS
Mosin Hasan and Nilesh Prajapati, , BVM Engineering College, V V nagar, Gujarat,India
067 Accuracy of 3D location computation in GSM through NS2
Anand Gupta, Harsh Bedi, Don Bosco and Vinay Shashidhar , Netaji Subhas Institute Of Technology,India, Delhi University,India
068 Cricket/Mica2 Based Discrete Event Simulator for WiHoc Ver.1.0 Localization Analysis
Shamala.S, Sangeetha. T and Moqry, , University Putra Malaysia Malaysia
070 Anonymous but Traceable IP Address-based Communication System
Keiichi Sakakima, Shingo Ata and Hiroshi Kitamura, , Osaka City University NEC Corporation / University of Electro-Communications, Japan
070 Anonymous but Traceable IP Address-based Communication System
Keiichi Sakakima, Shingo Ata and Hiroshi Kitamura, , Osaka City University NEC Corporation / University of Electro-Communications, Japan
071 Enhancing QoS and QoE in IMS enabled Next Generation Networks
Kamaljit I. Lakhtaria ,Saurashtra University,India
077 A SCHEME FOR THE DESIGN AND IMPLEMENTATION OF A DISTRIBUTED INTRUSION DETECTION SYSTEM
K.B.Chandradeep, ,JNTU India
079 PERFORMANCE IMPROVEMENT OF WIRELESS SENSOR NETWORKS USING LAYERED SPACE TIME CODES
Dr. M.A.Bhagyaveni, K.Rajeswari ,Anna University CEG
080 Neural Network Based Energy Efficient Clustering and Routing in Wireless Sensor Networks
Neeraj Kumar, 2R.B. Patel, Manoj Kumar ,SMVD University, Katra (Jammu & Kashmir), India, 2 MM University, Mullana (Ambala), India
081 Opportunistic Auto-Adaptive Dissemination in Vehicular Ad-hoc Networks
Niu Jianwei, Liu Chang, Ma Jian ,School of Computer Science and Engineering, Beijing University of Aeronautics and Astronautics Beihang University Nokia Research Center China
082 Throughput enhancement of starved TCP Flow Through concurrent transmission
Rajesh Verma, Arun Prakash, Rajeev Tripathi,Neeraj Tyagi ,MNNIT, Allahabad
084 Self-Stabilizing Multi Point Relays for Connected Dominating Set in Adhoc Networks
Rajiv Misra ,IIT Patna
086 The FN Quadratic Marking/Dropping Probability Function
Mohammed M. Kadhum & Suhaidi Hassan , Universiti Utara Malaysia
089 Multiple Mobile Routers based Seamless Handover Scheme for Next Generation Heterogeneous Networks
Arun Prakash,Rajesh Verma, Rajeev Tripathi, and Kshirsagar Naik1 , MNNIT, Allahabad, India , 1 University of Waterloo, Canada
090 Adaptive routing algorithm for MANET:Termite
Sharvani Gunakimath,Cauvery N.K,Rangaswamy T , R.V.C.E,India
094 Tree-Like Peer-to-Peer Symmetric Key Management in Mobile Ad hoc Network
Girish Kumar Patnaik,M. M. Gore ,MNNIT, Allahabad UP India
103 AMOBIROUTE: An Advanced Mobility Based Ad Hoc Routing Protocol for Mobile Ad Hoc Networks
Suparna DasGupta & Rituparna Chaki , JIS College of Engineering, Kalyani
104 Localization Scheme for Three Dimensional Wireless Sensor Networks Using GPS Enabled Mobile Sensor Nodes
Vibha Yadav, Manas Kumar Mishra, A. K. Singh, and M. M. Gore , Motilal Nehru National Institute of Technology
111 performance analysis of MANET under blackhole attack
Anu Bala, Jagpreet singh, Munish Banasal , Punjab university,India
112 Service Coverage Bounds Through Efficient Load Approximation in UMTS Network Planning
Sasthi Ghosh,Roger Whitaker, Stuart Allen and Steve Hurley , 1 Cardiff University, UK
113 Secure Mobile Multicast Handoff Mechanisms using a Time-limited key
Miyeon Yoon, Mijoo Kim,Kwangkyum Lee, Yongtae Shin , Korea Information Security Agency Soongsil University Korea
114 A Middleware Architectural framework for Vehicle Safety over VANET
K. Saravanan, Arunkumar Thangavelu , VIT University
116 AN ENERGY-CONSERVING TOPOLOGY MAINTENANCE ALGORITHM FOR MANETS
S.Muthuramalingam B.Bavya P.Janani R.Rajaram , TCE,India
117 Node Mobility support scheme between the mobile network and PMIPv6 networks
Hyo-Beom Lee, Youn-Hee Han, Sung-Gi Min , Korea University Korea University of Technology and Education, S.Korea
119 A New Algorithm of Self Organization in Wireless Sensor Network
Hemanta Kumar Kalita, and Avijit Kar , Jadavpur University
121 A Tunnel Compress Scheme for PMIPv6-based Nested NEMO
Min-Soo Woo, Hyo-Beom Lee, Youn-Hee Han, Sung-Gi Min , Korea University Korea University of technology and education
127 An Approach for Security Assessment of Network Configurations using Attack Graph
Nirnay Ghosh, S. K. Ghosh , Indian Institute of Technology, Kharagpur, India
129 Agent Based Web Services with RuleML for Network Management
Mydhili K Nair, V Gopalakrishna , M S Ramaiah Institute of Technology Integra Micro Systems, Bangalore, India
130 Posture-Predictive Power Control in Body Sensor Networks using Linear-Quadratic Gaussian Control
Muhannad Quwaider, Azizah Muhammad, Jongeun Choi, and Subir Biswas , Michigan State University USA
131 Galaxia: A Semi-Decentralized System for Implementing Secure-Group P2P Networks
Saurav Muralidharan, Sajin Koroth, Nevil Anto, Rafeeque P.C , Govt. College of Engineering, Kannur
132 A Genetic Algorithm Based Oblivious Image Watermarking Scheme using Singular Value Decomposition
Jagadeesh Bandi,Srinivaskumar S, Raja Rajeswari K , JNTU Kakinada, Kakinada, India, Andhra University,Visakhapatnam, India
133 Improved Optimal Searching Techniques in Distributed P2P networks using Guided Protocol Approach
S.Bhaskaran , SASTRA University,India
134 COMPARATIVE STUDY OF VARIOUS COOLING SCHEDULES FOR LOCATION AREA PLANNING IN CELLULAR NETWORKS USING SIMULATED ANNEALING
Nilesh Prajapati, Rupal Agravat, Mosin Hasan , B.V.M. Engineering College, V.V.Nagar,India
136 An Analytical Model of Multi-Service Call Admission Control in Next Generation Wireless Overlay Networks
Asish K Mukhopadhyay, Sajal Saha, Suranjan Ghose, Debashis Saha , Jadavpur University, Kolkata IIM Calcutta
137 ìVoIP: CrossLayer Optimization of bufferoperations for providing secure VoIP services on constrained embedded devices
Dinil.D1, Aravind.P.A1, Thothadri Rajesh1, Aravind.P1, Anand.R1, Br. Jayaraj P* , Amrita Vishwa Vidyapeetham,India
138 Energy based Quantization for Image Compression using Contourlet Transform
Kilari Veeraswamy,Y.V.Bhaskar Reddy, B.Chandra Mohan, S.Srinivas Kumar , JNTU Kakinada, Kakinada, India.
140 An Improved Method of Detecting Spoofed Attack in Wireless LAN
Shikha Goel & Sudesh Kumar , , PEC University of Technology, Chandigarh,India
142 Wireless Sensor Network Security Analysis
Hemanta Kumar Kalita, and Avijit Kar , Jadavpur University
143 A Status Monitoring System Design/Implementation for Home Appliances controlled by home server
Boyoung Lee, Deokjai Choi , chonnam university Chonnam National University Korea
149 Cross-Layer Interference Avoidance MAC Protocol for Dense Wireless Sensor Networks
Behnam Dezfouli1, Marjan Radi2, Mohamad A. Nematbakhsh3 , Azad University of Najafabad Iran
168 "Reminder: please update your details”: Phishing Trends
Cynthia.D & Jae Kwang Lee , Hannam University,South Korea
NCS 001 Fuzzy Switching Controller for the Security in 802.11 Networks
Xu Huang, Dharmendra Sharma ,University of Canberra,
Canberra, Act 2601 Australia
NCS 003 Performance Evaluation of ADV with AODV For Mobile Ad-Hoc Networks
A. Nagaraju , CH.Ramya Krishna , Kamala Institute of Technology & Science, Huzurabad,India
NCS 012 An Agent based security framework for protecting Network Layer operations in MANET
N.Jaisankar, R.Saravanan, Dr. K. Durai Samy ,
School of Computing Sciences, VIT University, Tamilnadu, India
NCS 014 An Improved Collaborative Recommender System
M.K.Kavitha Devi, Dr.P.Venkatesh, Thiagarajar College of Engineering, Madurai, India
NCS 015 A Mobility Management Solution to Support Mobile Station in Wireless Mesh Networks
Jilong Li, Kijun Han, Department of Computer Engineering,Kyungpook National University,Daegu, Korea
NCS 017 An Efficient Routing Protocol based on Position Information in Mobile Sensor Networks
Kihyun Kim and Kijun Han, Kyungpook National University Department,Electrical Engineering and Computer Science,Daegu, Korea
NCS 019 A Routing Metric for Efficient Load Balance in Wireless Mesh Networks
Sooyeol Yang, Kijun Han, Department of Computer Engineering,Kyungpook National University,Daegu, Korea
NCS 021 A self-adjustable rate control mechanism for congestion avoidance in wireless sensor networks
Young-mi Beak and Ki-jun Han, Dept. of Computer Engineering,Kyungpook National University, Daegu, Korea
NCS 023 Simulation Based Performance Comparison of Community Model, GFMM,RPGM, Manhattan Model and RWP-SS Mobility Models in MANET
Gowrishankar.S, T.G.Basavaraju 2, SubirKumarSarkar, Department of Electronics and Telecommunication Engineering,Jadavpur University, Kolkata,West Bengal, India.
2National Institute of Technology Karnataka (NITK), India.
NCS 025 iMeasure Security (iMS): A Novel Framework for Security Quantification
Vijayaraghavan V and Sanjoy Paul, SETLabs, Infosys Technologies Limited, Bangalore, India.
NCS 027 Supporting Negative Authorization in Spatiotemporal Role Based Access Control
Samrat Mondal, Shamik Sural, School of Information Technology,
IIT Kharagpur, India
NCS 029 A Framework for Licensed Digital Signatures
Alper Ugur, Ibrahim Sogukpinar, Network and Information Security Lab., Gebze Institute of Technology, Kocaeli,Turkey
NCS 031 Packet Marking With Distance Based Probabilities for IP Traceback
Turker Akyuz , Ibrahim Sogukpinar, Gebze Institute of Technology,Turkey
NCS 042 Crowd Management with RFID & Wireless Technologies
Mohammad Yamin,Yasser Ades
University of Canberra ACT 2601 Australia,University of Greenwich, UK