Vol 4, No 6 (2012)

Table of Contents

Vol 4, No 6 (2012)

Open Access Open Access  Restricted Access Subscription Access

Articles

Study and Analysis of a New Data Encryption Technique Using Special Symbols Shifting
Sayani Manna, Satarupa Chatterjee, Tuhina Koley, Monali Mukherjee, Sanjay Chakraborty
 Vol 4, No 6 (2012), Pagination: 311-315
ABSTRACT |  PDF     Abstract Views: 170  |  PDF Views: 3
A High Throughput Pattern Matching Using Byte Filtered Bit_Split Algorithm
C. R. Rathish, P. Devasundar
 Vol 4, No 6 (2012), Pagination: 316-319
ABSTRACT |  PDF     Abstract Views: 176  |  PDF Views: 4
Enhancement of Video Streaming Quality in Lossy Wireless Mesh Network
D. Ramesh, D. Ayya Muthukumar
 Vol 4, No 6 (2012), Pagination: 320-323
ABSTRACT |  PDF     Abstract Views: 148  |  PDF Views: 8
Cloud Computing:A Next Generation Revolution in IT with e-Governance
Vivek Tiwari, Umesh Bindal, Shailesh Pandey
 Vol 4, No 6 (2012), Pagination: 324-330
ABSTRACT |  PDF     Abstract Views: 164  |  PDF Views: 3
New Data Encryption Standard Algorithm
C. V. Anchugam
 Vol 4, No 6 (2012), Pagination: 331-336
ABSTRACT |  PDF     Abstract Views: 153  |  PDF Views: 3
Fuzzy-Ant Based Dynamic Routing on Large Road Networks
M. Geetha, G. M. Kadhar Nawaz
 Vol 4, No 6 (2012), Pagination: 337-342
ABSTRACT |  PDF     Abstract Views: 155  |  PDF Views: 1
Managing Trust and Detecting the Guilty Party in P2P Networks
G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar
 Vol 4, No 6 (2012), Pagination: 343-346
ABSTRACT |  PDF     Abstract Views: 185  |  PDF Views: 3
Entropy Variation Based Detecting DDoS Attack in Large Scale Networks
M. Uthaya Kumar, B. Aysha Banu
 Vol 4, No 6 (2012), Pagination: 347-355
ABSTRACT |  PDF     Abstract Views: 153  |  PDF Views: 2
Ensuring Security and Dynamic Operation Support for Storage Services in Cloud Computing
V. K. Deepa, S. Jothichellammal
 Vol 4, No 6 (2012), Pagination: 356-359
ABSTRACT |  PDF     Abstract Views: 143  |  PDF Views: 1