Sundan Bose

According to our database1, Sundan Bose authored at least 14 papers between 2007 and 2016.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Efficient Identification of Structural Relationships for XML Queries using Secure Labeling Schemes.
Int. J. Intell. Inf. Technol., 2016

A Detailed Survey on Recent Trends in Secure XML Labeling Schemes.
Proceedings of the International Conference on Informatics and Analytics, 2016

IBeH: Naïve Community Detection Methodology for Dark Social Network.
Proceedings of the International Conference on Informatics and Analytics, 2016

2015
Stochastic model: reCAPTCHA controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by Aumann agreement theorem against DDoS attack in MANET.
Clust. Comput., 2015

Energy Efficient XPath Query Processing on Wireless XML Streaming Data.
Comput. Informatics, 2015

2014
SpyNetMiner: An Outlier Analysis to Tag Elites in Clandestine Social Networks.
Int. J. Data Warehous. Min., 2014

A Firegroup Mechanism to Provide Intrusion Detection and Prevention System Against DDos Attack in Collaborative Clustered Networks.
Int. J. Inf. Secur. Priv., 2014

Chinese remainder theorem based centralised group key management for secure multicast communication.
IET Inf. Secur., 2014

2013
Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication.
KSII Trans. Internet Inf. Syst., 2013

Centralized key distribution protocol using the greatest common divisor method.
Comput. Math. Appl., 2013

2011
Error Detection and Correction for Distributed Group Key Agreement Protocol
CoRR, 2011

Key Distribution Protocol for Secure Multicast with Reduced Communication Delay.
Proceedings of the Active Media Technology - 7th International Conference, 2011

Key Distribution for Pay-TV System with Reduced Computation Cost Using XOR Operation.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

2007
Adaptive Multipath Multimedia Streaming Architecture for Mobile Networks with Proactive Buffering using Mobile Proxies.
J. Comput. Inf. Technol., 2007


  Loading...