Karpagam Arts and Science College, Coimbatore-21.

(AUTONOMOUS)

 

National Conference on

Cryptography and Network Security

(NCCNS 2006)

 

Selected Paper Details

 

Sl.No

Paper Title

Author Details

  1.  

Palm Vein Biometrics

A.V.N.Krishna

Head,  Dept. of CSE

 

M.Pavan Roy

Asst.Prof CSE & IT Dept.

Indur Institute Of Eng & Technology.

 

[email protected]

  1.  

Secured routing in adhoc networks using Pre-deployed infrastructure

Santhosh  Rebello

Asst. Professor& Course Coordinator

Dept of MCA & MSc (Bio-Informatics)

St Aloysius College, Mangalore- 575003

 

[email protected]

  1.  

Password Authentication Using Graphical Images: A Review Article

 

Ashish Chaturvedi

Department of Physics, IIET, Bareilly,

[email protected]

 

Supriya Gupta

Department of Computer Science,

IIET, Bareilly. [email protected]

  1.  

Transport Layer Protocol Exploitation Attempts for DoS/DDoS Attacks: Issues and Challenges

V Anil Kumar, G K Patra, R P Thangavelu and Antaryami Sahu

CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India

 

{anil, gkpatra, thangam}@ cmmacs.ernet.in 

  1.  

Hi-tech Authentication for palette images using Digital Signature and Data Hiding

P.Arockia Jansi Rani, Dr.R.S.Rajesh

And Mr.R.Balasubramanian *

Department of Computer Science and Engineering,

Manonmaniam Sundaranar University, Tirunelveli-12, TamilNadu, India.

[email protected]

  1.  

                                                        

 

The contribution of cryptography and steganography to internet security

 

Prof. Kirti Mahajan,

Assistant Professor,

B.V.D.U., I.M.E.D., Erandwane, PUNE-38

Prof. Nilesh Mahajan,

Assistant Professor,

B.V.D.U., I.M.E.D., Erandwane, PUNE-38

 

[email protected]

 

  1.  

Attacks and Defense in Wireless Ad Hoc Network

M.B.Mukesh Krishnan

Lecturer, Dept. of CSE

Ganadipathy Tulsi’s Engg College

Vellore 632 102 , Tamil Nadu , India

[email protected]

                       

    Prof.G.IlanchezhiaPandian  

Professor and Head 

[email protected]

 

   Prof. Dr. P. ShiekAbdulKadher         

Professor and Head, Dept. of Computer Application

Crescent Engineering College, Vandalore Chennai 600 048 ,India

[email protected]

  1.  

An innovative cyber voting system for Internet terminals and mobile phones (E-M-Voting)

Ramesh. B.E.

Sr. Lecturer and HOD of Master of Computer Applications SJMIT

Chitradurga - 577 502, Karnataka,

 

[email protected] 

 

Dr. B. Shadaksharappa,

Professor & Head, Dept. of CSE

Shirdi Sai Engineering College, Bangalore, Karnataka,

[email protected]

  1.  

Database Security - The Ontology Approach

D. Jayasri, Asst. Professor

Sethu Institute of Technology

Virudhunagar Dt

 jaysri6@ yahoo.co.in

 

P.Murugeswari

[email protected]

 

S.Vijayalakshmi      

vijipandy@ yahoo.com  

 

B.Meenakshi Sundaram ,Lecturer, R.L. Institute of Technology, Madurai Dt.

bm_sundaram@ gmail.com

  1.  

The new Cryptosystem which is non crackable implicitly by virtue of its Algorithm

Muralee Krishnan.C.R

Aswathy, Cherukara PO, Kerala-679340, India.

 

[email protected]

 

  1.  

Exotic Topology Control Algorithm to Conserve Energy for Ad-Hoc Networks.

 

R.S.Syam Dev, Final Year M.E [CSE], J.J. College of Engineering and Technology, Trichy.

 

[email protected] 

 

M.Anuradha

Lecturer, Department of CSE, J.J. College of Engineering and Technology, Trichy.

 

[email protected]

  1.  

Analysis Of Recent Algorithms In Different Schemes Of Cryptographic System

G.SELVAVINAYAGAM B.E.,

Lecturer, Department of Computer Science and Engineering,    

ohmselva @ gmail.com             

W.JAI SINGH M.C.A., M.Phil.,

Lecturer, Department of Master of Computer Applications,

Park College of Engineering and Technology,

Coimbatore – 641659.                                                               

[email protected]

  1.  

Internet Database Security

 

C.Suresh Gnana Dhas  Asst. Professor Dept. of Computer Science and Engg. CSI Institute of Technology,Thovalai,    e-mail : [email protected] and

M.J.Carmel Mary Belinda, Senior Lect. , Dept. of Computer Science and Engg. CSI Institute of Technology,Thovalai,    e-mail : [email protected]

  1.  

Mutual Chaotic Synchronization for Secure Communication

G K Patra, T R Ramamohan, V Anil Kumar, R P Thangavelu

CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India, PIN-560 037. (e-mail: [email protected])

  1.  

Performance Evaluation of IEEE 802.11 Wireless LAN Securities

Dr. Atul M. Gonsai

Assist. Prof. Department of Computer Science,

Saurashtra University Rajkot-360005

Ph. (0) 91-281-2585232, (M) 91-94272 36866

[email protected]

 

  1.  

Extensible Authentication Protocol -Flexible Authentication via Secure Tunneling     for   Secure Shell Wireless LAN      (SSH-WLAN).

 

Arun Kumar B. R  

Senior Lecturer, Dept. of M.C.A,

Sir M.V. Institute of Technology

Hunasamaranahalli, Yelahanka , Bangalore-562157

[email protected]

 

  1.  

State-of-Art Operating System for E-Learning Security

Ms. M. Suryakala

Ph.D Research Scholar,

National Institute Of Technical Teachers’ Training And Research

Taramani, Chennai 600113

 

Dr. T. G. Sambanthan

Head, Computer Centre

National Institute Of Technical Teachers’ Training And Research

Taramani, Chennai 600113

 

  1.  

Robust Data Hiding using Error Correcting Codes

Y.Sreenivasula goud,

Asst.Prof of ECE Dept,

G.P.R.Engg.College, Kurnool,

 

Dr.K.E.Sreenivasa Murthy,

Prof of ECE Dept,

G.P.R.E.C,Kurnool,

N.Vijay Kumar,

Asst.Prof of  ECE,G.P.R.E.C, Kurnool.,A.P

 

[email protected]                                          

 

  1.  

Denial-Of-Service Resistance and Delay Optimization in Multicast Authentication throughout Multigrade Security

N.SenthilSelvan,FinalYear M.E[CSE],J.J.College of Engineering and Technology,Trichy.

[email protected]

S.Neduncheliyan,Professor/HOD[CSE], J.J.College of Engineering and Technology,Trichy.

[email protected]

  1.  

A Comparison between Secret Sharing Schemes based on Latin square and Magic Square

P.Sundararajan M.CA,MPhil, A.Nagamuruganandam MCA,

P.Joe Arun Raja M.Tech

Ayya Nadar Janaki Ammal College (Autonomous)

Sivakasi-626 123

 

[email protected]

[email protected]

 

  1.  

Object Oriented Steganography technique for Multimedia files

Kangavel.A, Krishnamani.R

Students of MCA, V.H.N.S.N.College Virudhunagar

C.K.Balaji

Faculty of Computer Applications, V.H.N.S.N.College, Virudhunagar

 

[email protected]

 

  1.  

VPN for Remote Digital Evidence Acquisition

Vinod Chandra .S .S

Department of Computer Science & Engineering, College of Engineering, Thiruvananthapuram, Kerala, [email protected]

 

Lekshmi Priya K

Department of Computer Applications, College of Engineering

Thiruvananthapuram, Kerala, [email protected]

  1.  

Defending Against Denial Of Service In Secure Group Communication

S.Sudhakar Ilango,

FinalYear M.E[CSE],

J.J.College of Engineering and Technology,Trichy.

[email protected]

 

S.Neduncheliyan,

Professor/HOD[CSE], J.J.College of Engineering and Technology, Trichy. [email protected]

  1.  

Distributed Token Circulation for total ordering of message in Group communication

 

Bhaskar  Prakash  Kosta ME[CSE] Final  year student, J.J College of Engineering and Technology,Trichy

[email protected]

 

S.Neduncheliyan

Professor/HOD[CSE], J.J.College of Engineering and Technology,Trichy.

[email protected]

 

  1.  

Enhanced   security   through   dual encryption with Time based key technique

 

B.Lakshmi, 

Lecturer, Department. of  Comp. Science, Nehru Memorial College, Puthanampatti.

 

T.N.Prabakar

Research Scholar, National Institute of Technology, Tiruchirappalli.

 

[email protected]

 

  1.  

Comparative study On Denial of service attacks

S.ABISHA and R.SUBRAMANIAN

Department of Computer Science & Engg,

Arulmigu Kalasalingam College of Engineering,

KrishnanKoil - 626 190.

 

[email protected]

  1.  

A Cryptosystem For Remote Designers Of Object Oriented Software

[email protected]

  1.  

An Agent Based Intrusion Detection, Response and Blocking using signature method in Active Networks

 

K.Sindhanaiselvan

Final Year M.E [CSE],

J.J.College of Engineering and Technology, Trichy.

[email protected]

 

R.Sumathi

Professor, Department of M.E [CSE], J.J.College of Engineering and Technology, Trichy                     

[email protected]

  1.  

Data Hiding Using Entropy Thresholding of Image for Secured Communication

Suresh N Mali,

Assistant Professor, Department of Computer Engineering, Vishwakarma Institute of Technology, Pune and member IEEE

 

Rajesh M Jalnekar

Asst.  Professor, Department of Electronics Engineering, V I Technology, Pune 

 

Jayadevan R , Lecturer, Department of I T,

Pune Institute of Computer Technology, Pune

 

Priyadarshan S. Dhabe  Asst. Professor, VIT

1 [email protected]

2 [email protected]

3 [email protected]

4  [email protected]

 

  1.  

Iris Recognition for Biometrics

Prof. Deepa P Hebalkar

Prof. Deepali D Shahane

Bharati Vidyapeeth’s I.M.E.D, Pune

[email protected]

  1.  

Tracing Multiple Attackers with Trust-based Deterministic Packet Marking

(t-DPM)

 

Firos.A *, Dr.N.Nedunchelian **

*Firos.A, Final Year M.E [CSE], J.J. College of Engineering and Technology, Trichy. [email protected]

** Professor and HOD, Department of ME CSE, J.J. College of Engineering and Technology, Trichy.

  1.  

A Novel Secure Authentication Protocol Based on Cluster For Ad Hoc networks [NSAP]

 

T.Sreedhar*, P.D.Sheba Kezia Malarchelvi**

* Final Year M.E [CSE], J.J.College of Engineering and Technology, Trichy. [email protected]

** Professor, Department of CSE, J.J.College of Engineering and Technology, Trichy.

[email protected]

  1.  

Predictive Job Scheduling in a Connection Limited System using Parallel Genetic Algorithm

 

S.Pramod, Final Year M.E [CSE], J.J. College of Engineering and Technology, Trichy. [email protected]

M.Anuradha Lecturer, Department of CSE, J.J. College of Engineering and Technology, Trichy. [email protected]

  1.  

Security In Air Interface Fixed Broad Band Wireless Access Systems

 

A.Jegatha

ME-II Year(CSE)

MNM Jain Engineering College,Chennai

[email protected]

  1.  

Biometrics

Aurelia leena sharmi. L

Lecturer, department of computer science

Ethiraj college for women

Chennai 600008

[email protected]

  1.  

Protection of Digital Images Using Self Embedding 

Y. Sreenivasula Goud,

Asst. Prof. of ECE Dept, GPREC, Kurnool,

C.Mohan Rao

Asst. Prof. of ECE Dept, GPREC, Kurnool, N.Vijay Kumar

Asst. Prof. of ECE Dept, GPREC, Kurnool,A.P

[email protected] [email protected]

  1.  

Efficient Intrusion Detection Systems on FPGA

Ajith Kumar, Programmer

Technical Education Dept,

Haryana

[email protected]

Nripendra N.Das

Institute of Technology and Management, Guragon

[email protected]

Sanjay Kumar (S/W Engineer)

Keans India Ltd, Gurgaon

[email protected]

  1.  

Randomized Encryption Cryptosystem

R.Sivaram

Research Scholar

Presidency College, Chennai-600005

 

Dr. S.Antonyraj

Reader, Dept. of Mathematics

Presidency College, Chennai-600006

  1.  

Routing Protocols and Security

Ajith Kumar V.

Specialist, Talent Transformation

Wipro Technologies

 

[email protected] 

 

Hosted by www.Geocities.ws

1