Vol 6, No 4 (2014)

Table of Contents

Vol 6, No 4 (2014)

Open Access Open Access  Restricted Access Subscription Access

Articles

Risk-Aware Approach for Handling Routing Attacks and Selfishness Using RBNC in MANET
P. Hemavathy, Kanmani Govindaraj, Karthika Kothandam
 Vol 6, No 4 (2014), Pagination: 139-144
ABSTRACT |  PDF     Abstract Views: 158  |  PDF Views: 2
A Collusion-Resistant Acknowledgement-Based Scheme for Mitigation of Packet Drop in MANETs
G. D. Anjaly, J. C. Kavitha
 Vol 6, No 4 (2014), Pagination: 145-149
ABSTRACT |  PDF     Abstract Views: 326  |  PDF Views: 2
GF (2m) Based Low Complexity Multiplier for Elliptic Curve Cryptography Systems
K. Rajadurga, S. Ram Kumar
 Vol 6, No 4 (2014), Pagination: 150-155
ABSTRACT |  PDF     Abstract Views: 179  |  PDF Views: 3
A Comparison of Data Replication Schemes to Achieve an Optimum Query Delay and Efficient Data Access in MANETs
Joslin Anie Abraham, C. D. Suriyakala
 Vol 6, No 4 (2014), Pagination: 156-160
ABSTRACT |  PDF     Abstract Views: 271  |  PDF Views: 2
Effect of Propagation Models on Analysis of MANET Routing Protocols
K. B. Wane, A. D. Bhoi, R. D. Kharadkar, A. Y. Deshmukh
 Vol 6, No 4 (2014), Pagination: 161-165
ABSTRACT |  PDF     Abstract Views: 184  |  PDF Views: 2
Efficient Authentication and Security of Multicast Streams over Lossy Channels Using Quantum Cryptography
D. Pavithra, S. Anitha
 Vol 6, No 4 (2014), Pagination: 166-169
ABSTRACT |  PDF     Abstract Views: 174  |  PDF Views: 2
Novel Multicast Key Authentication Protocol
S. Sasikala Devi, Antony Selvadoss Thanamani
 Vol 6, No 4 (2014), Pagination: 170-173
ABSTRACT |  PDF     Abstract Views: 163  |  PDF Views: 2