Table of Contents
Vol 5, No 3 (2013)
Open Access
Subscription Access
Articles
Mitigation of Flooding Attack Using Defense Mechanism in Mobile Adhoc Networks | ||
M. Muthu Meenakshi, P. Subathra | ||
Vol 5, No 3 (2013), Pagination: 97-101 | ||
ABSTRACT | PDF | Abstract Views: 224 | PDF Views: 2 |
Selection of Stable Route Under MANET by Using Randam Direction Mobility Model | ||
S. Sasikumar, S. Sudha | ||
Vol 5, No 3 (2013), Pagination: 102-106 | ||
ABSTRACT | PDF | Abstract Views: 214 | PDF Views: 3 |
Authenticating Ranked Keyword Search and Supporting Score Dynamics | ||
S. P. Ramya, G. Alaiyarasi | ||
Vol 5, No 3 (2013), Pagination: 107-112 | ||
ABSTRACT | PDF | Abstract Views: 189 | PDF Views: 2 |
DDoS Attacks Detection and Trace Back the System | ||
D. Delhi Ganesh | ||
Vol 5, No 3 (2013), Pagination: 113-125 | ||
ABSTRACT | PDF | Abstract Views: 217 | PDF Views: 3 |
Survey on Research Issues in Wireless Mesh Networks | ||
J. B. Shajilin Loret, K. Vijayalakshmi | ||
Vol 5, No 3 (2013), Pagination: 126-133 | ||
ABSTRACT | PDF | Abstract Views: 203 | PDF Views: 2 |
Preventing Denial of Service Attack in Multicast Authentication | ||
S. Geerthik, T. P. Anish | ||
Vol 5, No 3 (2013), Pagination: 134-139 | ||
ABSTRACT | PDF | Abstract Views: 211 | PDF Views: 2 |
Secure and Efficient RFID Authentication for Social Network in Cloud | ||
Sherin Jobe, G. Venifa Mini, J. Jeya A. Celin | ||
Vol 5, No 3 (2013), Pagination: 140-146 | ||
ABSTRACT | PDF | Abstract Views: 222 | PDF Views: 2 |