Table of Contents
Vol 6, No 4 (2014)
Open Access
Subscription Access
Articles
Risk-Aware Approach for Handling Routing Attacks and Selfishness Using RBNC in MANET | ||
P. Hemavathy, Kanmani Govindaraj, Karthika Kothandam | ||
Vol 6, No 4 (2014), Pagination: 139-144 | ||
ABSTRACT | PDF | Abstract Views: 231 | PDF Views: 2 |
A Collusion-Resistant Acknowledgement-Based Scheme for Mitigation of Packet Drop in MANETs | ||
G. D. Anjaly, J. C. Kavitha | ||
Vol 6, No 4 (2014), Pagination: 145-149 | ||
ABSTRACT | PDF | Abstract Views: 411 | PDF Views: 2 |
GF (2m) Based Low Complexity Multiplier for Elliptic Curve Cryptography Systems | ||
K. Rajadurga, S. Ram Kumar | ||
Vol 6, No 4 (2014), Pagination: 150-155 | ||
ABSTRACT | PDF | Abstract Views: 251 | PDF Views: 3 |
A Comparison of Data Replication Schemes to Achieve an Optimum Query Delay and Efficient Data Access in MANETs | ||
Joslin Anie Abraham, C. D. Suriyakala | ||
Vol 6, No 4 (2014), Pagination: 156-160 | ||
ABSTRACT | PDF | Abstract Views: 372 | PDF Views: 2 |
Effect of Propagation Models on Analysis of MANET Routing Protocols | ||
K. B. Wane, A. D. Bhoi, R. D. Kharadkar, A. Y. Deshmukh | ||
Vol 6, No 4 (2014), Pagination: 161-165 | ||
ABSTRACT | PDF | Abstract Views: 247 | PDF Views: 2 |
Efficient Authentication and Security of Multicast Streams over Lossy Channels Using Quantum Cryptography | ||
D. Pavithra, S. Anitha | ||
Vol 6, No 4 (2014), Pagination: 166-169 | ||
ABSTRACT | PDF | Abstract Views: 242 | PDF Views: 2 |
Novel Multicast Key Authentication Protocol | ||
S. Sasikala Devi, Antony Selvadoss Thanamani | ||
Vol 6, No 4 (2014), Pagination: 170-173 | ||
ABSTRACT | PDF | Abstract Views: 234 | PDF Views: 2 |