Vol 5, No 3 (2013)

Table of Contents

Vol 5, No 3 (2013)

Open Access Open Access  Restricted Access Subscription Access

Articles

Mitigation of Flooding Attack Using Defense Mechanism in Mobile Adhoc Networks
M. Muthu Meenakshi, P. Subathra
 Vol 5, No 3 (2013), Pagination: 97-101
ABSTRACT |  PDF     Abstract Views: 229  |  PDF Views: 2
Selection of Stable Route Under MANET by Using Randam Direction Mobility Model
S. Sasikumar, S. Sudha
 Vol 5, No 3 (2013), Pagination: 102-106
ABSTRACT |  PDF     Abstract Views: 218  |  PDF Views: 3
Authenticating Ranked Keyword Search and Supporting Score Dynamics
S. P. Ramya, G. Alaiyarasi
 Vol 5, No 3 (2013), Pagination: 107-112
ABSTRACT |  PDF     Abstract Views: 192  |  PDF Views: 2
DDoS Attacks Detection and Trace Back the System
D. Delhi Ganesh
 Vol 5, No 3 (2013), Pagination: 113-125
ABSTRACT |  PDF     Abstract Views: 225  |  PDF Views: 3
Survey on Research Issues in Wireless Mesh Networks
J. B. Shajilin Loret, K. Vijayalakshmi
 Vol 5, No 3 (2013), Pagination: 126-133
ABSTRACT |  PDF     Abstract Views: 208  |  PDF Views: 2
Preventing Denial of Service Attack in Multicast Authentication
S. Geerthik, T. P. Anish
 Vol 5, No 3 (2013), Pagination: 134-139
ABSTRACT |  PDF     Abstract Views: 215  |  PDF Views: 2
Secure and Efficient RFID Authentication for Social Network in Cloud
Sherin Jobe, G. Venifa Mini, J. Jeya A. Celin
 Vol 5, No 3 (2013), Pagination: 140-146
ABSTRACT |  PDF     Abstract Views: 225  |  PDF Views: 2