Karpagam
Arts and Science College, Coimbatore-21.
(AUTONOMOUS)
National Conference on
Cryptography and Network Security
(NCCNS 2006)
Selected Paper Details
Sl.No |
Paper Title |
Author
Details
|
|
|
Palm Vein Biometrics |
A.V.N.Krishna Head, Dept. of
CSE M.Pavan Roy Asst.Prof CSE & IT Dept. Indur Institute Of Eng & Technology. |
|
|
Secured routing in adhoc
networks using Pre-deployed infrastructure |
Santhosh Rebello Asst. Professor& Course Coordinator Dept of MCA & MSc (Bio-Informatics) St Aloysius College, Mangalore- 575003 |
|
|
Password Authentication Using Graphical Images: A Review
Article |
Ashish Chaturvedi Department of Physics, IIET, Bareilly, Supriya Gupta Department of Computer Science, IIET, Bareilly. [email protected]
|
|
|
Transport Layer Protocol
Exploitation Attempts for DoS/DDoS Attacks: Issues and Challenges |
V Anil Kumar, G K Patra, R P Thangavelu and Antaryami
Sahu CSIR Centre for Mathematical Modelling and Computer Simulation, Bangalore, India {anil, gkpatra, thangam}@
cmmacs.ernet.in |
|
|
Hi-tech Authentication for
palette images using Digital Signature and Data Hiding |
P.Arockia Jansi Rani, Dr.R.S.Rajesh And Mr.R.Balasubramanian * Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tirunelveli-12, TamilNadu,
India. |
|
|
The contribution of cryptography and
steganography to internet security |
Prof. Kirti Mahajan, Assistant Professor, B.V.D.U., I.M.E.D., Erandwane, PUNE-38 Prof. Nilesh Mahajan, Assistant Professor, B.V.D.U., I.M.E.D., Erandwane, PUNE-38 |
|
|
Attacks and Defense in
Wireless Ad Hoc Network |
M.B.Mukesh Krishnan Lecturer, Dept. of CSE Ganadipathy
Tulsi’s Engg College Vellore
632 102 , Tamil Nadu , India Prof.G.IlanchezhiaPandian Professor
and Head Prof. Dr. P.
ShiekAbdulKadher Professor
and Head, Dept. of Computer Application Crescent
Engineering College, Vandalore Chennai 600 048 ,India |
|
|
An innovative cyber voting system for Internet
terminals and mobile phones (E-M-Voting) |
Ramesh.
B.E. Sr.
Lecturer and HOD of Master of Computer Applications SJMIT Chitradurga
- 577 502, Karnataka, Dr. B.
Shadaksharappa, Professor
& Head, Dept. of CSE Shirdi
Sai Engineering College, Bangalore, Karnataka, |
|
|
Database Security - The Ontology Approach |
D.
Jayasri, Asst. Professor Sethu
Institute of Technology Virudhunagar
Dt jaysri6@ yahoo.co.in P.Murugeswari S.Vijayalakshmi vijipandy@ yahoo.com B.Meenakshi
Sundaram ,Lecturer, R.L. Institute of Technology, Madurai Dt. bm_sundaram@ gmail.com |
|
|
The new Cryptosystem which is non crackable
implicitly by virtue of its Algorithm |
Muralee Krishnan.C.R Aswathy, Cherukara PO, Kerala-679340, India. |
|
|
Exotic Topology Control Algorithm to Conserve
Energy for Ad-Hoc Networks. |
R.S.Syam
Dev, Final Year M.E [CSE], J.J. College of Engineering and Technology,
Trichy. M.Anuradha Lecturer,
Department of CSE, J.J. College of Engineering and Technology, Trichy. |
|
|
Analysis Of Recent Algorithms In Different
Schemes Of Cryptographic System |
G.SELVAVINAYAGAM
B.E., Lecturer, Department of Computer Science and
Engineering, ohmselva @ gmail.com W.JAI SINGH
M.C.A., M.Phil., Lecturer, Department of Master of Computer
Applications, Park College of Engineering and Technology, Coimbatore – 641659. |
|
|
Internet Database
Security
|
C.Suresh
Gnana Dhas Asst. Professor Dept. of
Computer Science and Engg. CSI Institute of Technology,Thovalai, e-mail : [email protected] and M.J.Carmel
Mary Belinda, Senior Lect. , Dept. of Computer Science and Engg. CSI
Institute of Technology,Thovalai,
e-mail : [email protected] |
|
|
Mutual Chaotic Synchronization for Secure
Communication |
G K
Patra, T R Ramamohan, V Anil Kumar, R P Thangavelu CSIR
Centre for Mathematical Modelling and Computer Simulation, Bangalore, India,
PIN-560 037. (e-mail: [email protected]) |
|
|
Performance Evaluation of IEEE 802.11 Wireless
LAN Securities |
Dr. Atul M. Gonsai Assist. Prof. Department of
Computer Science, Saurashtra University
Rajkot-360005 Ph. (0) 91-281-2585232, (M)
91-94272 36866 |
|
|
Extensible
Authentication Protocol -Flexible Authentication via Secure Tunneling for
Secure Shell Wireless LAN
(SSH-WLAN). |
Arun Kumar B. R Senior Lecturer, Dept.
of M.C.A, Sir M.V. Institute of
Technology Hunasamaranahalli,
Yelahanka , Bangalore-562157 |
|
|
State-of-Art Operating System for E-Learning
Security |
Ms. M. Suryakala Ph.D Research Scholar, National Institute Of
Technical Teachers’ Training And Research Taramani, Chennai
600113 Dr. T. G. Sambanthan Head, Computer Centre National Institute Of
Technical Teachers’ Training And Research Taramani, Chennai
600113 |
|
|
Robust Data Hiding using Error Correcting Codes |
Y.Sreenivasula goud, Asst.Prof of ECE Dept, G.P.R.Engg.College,
Kurnool, Dr.K.E.Sreenivasa
Murthy, Prof of ECE Dept, G.P.R.E.C,Kurnool, N.Vijay Kumar, Asst.Prof of ECE,G.P.R.E.C, Kurnool.,A.P |
|
|
Denial-Of-Service Resistance and Delay
Optimization in Multicast Authentication throughout Multigrade Security |
N.SenthilSelvan,FinalYear M.E[CSE],J.J.College of
Engineering and Technology,Trichy. S.Neduncheliyan,Professor/HOD[CSE], J.J.College of
Engineering and Technology,Trichy. |
|
|
A Comparison between Secret Sharing Schemes based
on Latin square and Magic Square |
P.Sundararajan M.CA,MPhil, A.Nagamuruganandam MCA, P.Joe
Arun Raja M.Tech Ayya
Nadar Janaki Ammal College (Autonomous) Sivakasi-626 123 |
|
|
Object Oriented
Steganography technique for Multimedia files |
Kangavel.A,
Krishnamani.R Students of MCA,
V.H.N.S.N.College Virudhunagar C.K.Balaji Faculty of Computer
Applications, V.H.N.S.N.College, Virudhunagar |
|
|
VPN
for Remote Digital Evidence Acquisition |
Vinod Chandra .S .S Department of Computer
Science & Engineering, College of Engineering, Thiruvananthapuram,
Kerala, [email protected] Lekshmi Priya K Department of Computer Applications, College of
Engineering Thiruvananthapuram,
Kerala, [email protected] |
|
|
Defending Against
Denial Of Service In Secure Group Communication |
S.Sudhakar Ilango, FinalYear M.E[CSE], J.J.College of
Engineering and Technology,Trichy. S.Neduncheliyan, Professor/HOD[CSE], J.J.College
of Engineering and Technology, Trichy. [email protected]
|
|
|
Distributed Token
Circulation for total ordering of message in Group communication |
Bhaskar
Prakash Kosta ME[CSE]
Final year student, J.J College of
Engineering and Technology,Trichy S.Neduncheliyan Professor/HOD[CSE], J.J.College of Engineering and
Technology,Trichy. |
|
|
Enhanced security through dual
encryption with Time based key technique |
B.Lakshmi, Lecturer, Department.
of Comp. Science, Nehru Memorial
College, Puthanampatti. T.N.Prabakar Research Scholar,
National Institute of Technology, Tiruchirappalli. |
|
|
Comparative
study On Denial of service attacks |
S.ABISHA and
R.SUBRAMANIAN Department of Computer
Science & Engg, Arulmigu Kalasalingam
College of Engineering, KrishnanKoil - 626 190. |
|
|
A
Cryptosystem For Remote Designers Of Object Oriented Software |
||
|
An
Agent Based Intrusion Detection, Response and Blocking using signature method
in Active Networks |
K.Sindhanaiselvan Final
Year M.E [CSE], J.J.College
of Engineering and Technology, Trichy. R.Sumathi
Professor,
Department of M.E [CSE], J.J.College of Engineering and Technology,
Trichy |
|
|
Data
Hiding Using Entropy Thresholding of Image for Secured Communication |
Suresh
N Mali, Assistant
Professor, Department of Computer Engineering, Vishwakarma Institute of
Technology, Pune and member IEEE Rajesh
M Jalnekar Asst. Professor, Department of Electronics
Engineering, V I Technology, Pune Jayadevan
R , Lecturer, Department of I T, Pune
Institute of Computer Technology, Pune Priyadarshan
S. Dhabe Asst. Professor, VIT |
|
|
Iris
Recognition for Biometrics |
Prof. Deepa P Hebalkar Prof. Deepali D Shahane Bharati
Vidyapeeth’s I.M.E.D, Pune |
|
|
Tracing
Multiple Attackers with Trust-based Deterministic Packet Marking (t-DPM) |
Firos.A
*, Dr.N.Nedunchelian ** *Firos.A,
Final Year M.E [CSE], J.J. College of Engineering and Technology, Trichy. [email protected] **
Professor and HOD, Department of ME CSE, J.J. College of Engineering and
Technology, Trichy. |
|
|
A
Novel Secure Authentication Protocol Based on Cluster For Ad Hoc networks
[NSAP] |
T.Sreedhar*,
P.D.Sheba Kezia Malarchelvi** *
Final Year M.E [CSE], J.J.College of Engineering and Technology, Trichy. [email protected] **
Professor, Department of CSE, J.J.College of Engineering and Technology,
Trichy. |
|
|
Predictive
Job Scheduling in a Connection Limited System using Parallel Genetic
Algorithm |
S.Pramod,
Final Year M.E [CSE], J.J. College of Engineering and Technology, Trichy. [email protected] M.Anuradha
Lecturer, Department of CSE, J.J. College of Engineering and Technology,
Trichy. [email protected] |
|
|
Security In Air
Interface Fixed Broad Band Wireless Access Systems |
A.Jegatha ME-II Year(CSE) MNM Jain Engineering
College,Chennai |
|
|
Biometrics |
Aurelia leena sharmi. L Lecturer, department of computer
science Ethiraj college for
women Chennai 600008 |
|
|
Protection of Digital
Images Using Self Embedding |
Y. Sreenivasula Goud, Asst. Prof. of ECE
Dept, GPREC, Kurnool, C.Mohan Rao Asst. Prof. of ECE
Dept, GPREC, Kurnool, N.Vijay Kumar Asst. Prof. of ECE
Dept, GPREC, Kurnool,A.P |
|
|
Efficient Intrusion
Detection Systems on FPGA |
Ajith Kumar, Programmer Technical Education Dept, Haryana Nripendra N.Das Institute of Technology and Management,
Guragon Sanjay Kumar (S/W Engineer) Keans India Ltd, Gurgaon |
|
|
Randomized Encryption
Cryptosystem |
R.Sivaram Research Scholar Presidency College, Chennai-600005 Dr. S.Antonyraj Reader, Dept. of Mathematics Presidency College, Chennai-600006 |
|
|
Routing Protocols and
Security |
Ajith Kumar V. Specialist, Talent Transformation Wipro Technologies |