Table of Contents
Vol 5, No 8 (2013)
Open Access
Subscription Access
Articles
Fault Forbearance Methods for Randomized Intrusion Tolerance | ||
R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi | ||
Vol 5, No 8 (2013), Pagination: 379-382 | ||
ABSTRACT | PDF | Abstract Views: 243 | PDF Views: 3 |
Analysis and Implementation of Optimized Image Encryption Algorithm Using Bhramgupta-Bhaskara Equation | ||
Sanjay Chaudhari, Deepak Dembla | ||
Vol 5, No 8 (2013), Pagination: 383-388 | ||
ABSTRACT | PDF | Abstract Views: 262 | PDF Views: 2 |
Implementation of EESCP Protocol in Mobile Adhoc Networks | ||
P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan | ||
Vol 5, No 8 (2013), Pagination: 389-394 | ||
ABSTRACT | PDF | Abstract Views: 230 | PDF Views: 2 |
Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity | ||
G. Sankareeswari, C. Jeganathan | ||
Vol 5, No 8 (2013), Pagination: 395-401 | ||
ABSTRACT | PDF | Abstract Views: 229 | PDF Views: 2 |
Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility | ||
Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari | ||
Vol 5, No 8 (2013), Pagination: 402-406 | ||
ABSTRACT | PDF | Abstract Views: 247 | PDF Views: 2 |
Dynamic Job and Resource Grouping-Based Scheduling in Grid Computing | ||
P. Ashok | ||
Vol 5, No 8 (2013), Pagination: 407-411 | ||
ABSTRACT | PDF | Abstract Views: 236 | PDF Views: 2 |
Methods of Reducing False Alerts by Intrusion Detection System | ||
Prajakta Sandeep Jadhav | ||
Vol 5, No 8 (2013), Pagination: 412-416 | ||
ABSTRACT | PDF | Abstract Views: 231 | PDF Views: 2 |