The New Approach to provide Trusted Platform in MANET Renu Dalal1, Manju Khari1 and Yudhvir Singh2, 1AIACTR, India and 2U.I.E.T M.D University, India
Implementation of Secure Authentication Mechanism for LBS using best Encryption Technique on the Bases of Performance Analysis of cryptographic Algorithms
Gurjeet Kaur and Monika Sachdeva,S.B.S State Technical Campus,India
Credit Card Fraud Detection Based on Ontology Graph Ali Ahmadian Ramaki, Reza Asgari and Reza Ebrahimi Atani,GuilanUniversity, Iran
Study and Performance Evaluation of Security-Throughput Tradeoff with Link Adaptive Encryption Scheme Poonam Jindal and Brahmjit Singh,NIT Kurukshetra, India
Key Generation and Certification using Multilayer Perceptron in Wireless Communication [KGCMLP] Arindam Sarkar and J. K. Mandal,University of Kalyani, India
URL Analysis and Cross Site Scripting with Secured Authentication Protocol System in Financial Services R.Sujatha and G.Arumugam, Madurai Kamaraj University,India.
Information Retrieval from Internet Applications for Digital Forensic Ipsita Mohanty and R. Leela Velusamy, National Institute of Technology,India.
Effective Implementation and Avalanche Effect of AES Amish Kumar and Namita Tiwari, MANIT, India.
Power and Trust based Secured Routing Approach in MANET Arnab Banerjee, Aniruddha Bhattacharyya and Dipayan Bose, Institute of Engineering & Management, Saltlake, India.
Rushing Attack Defending Context Aware Trusted AODV in Ad-Hoc Network Swarnali Hazra and S.K.Setua, University of Calcutta, India
Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol Zulfa Shaikh1 and Poonam Garg2, 1Acropolis Institute of Technology & Research, India and 2Institute of Management Technology, Ghaziabad, India.
Hybrid Message-Embedded Cipher using Logistic Map Mina Mishra1 and V.H. Mankar2, 1Nagpur University, India and 2Government Polytechnic, Nagpur, India.
Generating Audio Signal Authentication through Secret Embedded Self Harmonic Component [GASASH] Uttam Kr. Mondal1 and J.K.Mandal2, 1College of Engg. & Management, Kolaghat , India and 2University of Kalyani, India.
Hash Based Least Significant Bit Technique for Video Steganography[HLSB] Kousik Dasgupta1, J.K. Mandal2 and Paramartha Dutta3, 1Kalyani Govt. Engineering College, India, 2Kalyani University, India and 3Visva-Bharati University, India
Design and Development of a Ticket-Based Scheduling and Load Sharing Algorithm for Optimal Resource Usage in Mobile Computing Environments Natarajan Meghanathan1 and Sanjeev Baskiyar2, 1Jackson State University, USA and 2Auburn University, USA
Trust-Based Approach in Wireless Sensor Networks Using an Agent to Each Cluster Yenumula B. Reddy, Grambling State University, USA