Table of Contents
Vol 5, No 3 (2013)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Mitigation of Flooding Attack Using Defense Mechanism in Mobile Adhoc Networks | ||
M. Muthu Meenakshi, P. Subathra | ||
Vol 5, No 3 (2013), Pagination: 97-101 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 179 | PDF Views: 2 |
Selection of Stable Route Under MANET by Using Randam Direction Mobility Model | ||
S. Sasikumar, S. Sudha | ||
Vol 5, No 3 (2013), Pagination: 102-106 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 165 | PDF Views: 3 |
Authenticating Ranked Keyword Search and Supporting Score Dynamics | ||
S. P. Ramya, G. Alaiyarasi | ||
Vol 5, No 3 (2013), Pagination: 107-112 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 145 | PDF Views: 2 |
DDoS Attacks Detection and Trace Back the System | ||
D. Delhi Ganesh | ||
Vol 5, No 3 (2013), Pagination: 113-125 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 175 | PDF Views: 3 |
Survey on Research Issues in Wireless Mesh Networks | ||
J. B. Shajilin Loret, K. Vijayalakshmi | ||
Vol 5, No 3 (2013), Pagination: 126-133 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 163 | PDF Views: 2 |
Preventing Denial of Service Attack in Multicast Authentication | ||
S. Geerthik, T. P. Anish | ||
Vol 5, No 3 (2013), Pagination: 134-139 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 173 | PDF Views: 2 |
Secure and Efficient RFID Authentication for Social Network in Cloud | ||
Sherin Jobe, G. Venifa Mini, J. Jeya A. Celin | ||
Vol 5, No 3 (2013), Pagination: 140-146 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 165 | PDF Views: 2 |