Vol 4, No 6 (2012)

Table of Contents

Vol 4, No 6 (2012)

Open Access Open Access  Restricted Access Subscription Access

Articles

Study and Analysis of a New Data Encryption Technique Using Special Symbols Shifting
Sayani Manna, Satarupa Chatterjee, Tuhina Koley, Monali Mukherjee, Sanjay Chakraborty
 Vol 4, No 6 (2012), Pagination: 311-315
ABSTRACT |  PDF     Abstract Views: 248  |  PDF Views: 3
A High Throughput Pattern Matching Using Byte Filtered Bit_Split Algorithm
C. R. Rathish, P. Devasundar
 Vol 4, No 6 (2012), Pagination: 316-319
ABSTRACT |  PDF     Abstract Views: 243  |  PDF Views: 4
Enhancement of Video Streaming Quality in Lossy Wireless Mesh Network
D. Ramesh, D. Ayya Muthukumar
 Vol 4, No 6 (2012), Pagination: 320-323
ABSTRACT |  PDF     Abstract Views: 208  |  PDF Views: 8
Cloud Computing:A Next Generation Revolution in IT with e-Governance
Vivek Tiwari, Umesh Bindal, Shailesh Pandey
 Vol 4, No 6 (2012), Pagination: 324-330
ABSTRACT |  PDF     Abstract Views: 229  |  PDF Views: 3
New Data Encryption Standard Algorithm
C. V. Anchugam
 Vol 4, No 6 (2012), Pagination: 331-336
ABSTRACT |  PDF     Abstract Views: 216  |  PDF Views: 3
Fuzzy-Ant Based Dynamic Routing on Large Road Networks
M. Geetha, G. M. Kadhar Nawaz
 Vol 4, No 6 (2012), Pagination: 337-342
ABSTRACT |  PDF     Abstract Views: 216  |  PDF Views: 1
Managing Trust and Detecting the Guilty Party in P2P Networks
G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar
 Vol 4, No 6 (2012), Pagination: 343-346
ABSTRACT |  PDF     Abstract Views: 245  |  PDF Views: 3
Entropy Variation Based Detecting DDoS Attack in Large Scale Networks
M. Uthaya Kumar, B. Aysha Banu
 Vol 4, No 6 (2012), Pagination: 347-355
ABSTRACT |  PDF     Abstract Views: 211  |  PDF Views: 2
Ensuring Security and Dynamic Operation Support for Storage Services in Cloud Computing
V. K. Deepa, S. Jothichellammal
 Vol 4, No 6 (2012), Pagination: 356-359
ABSTRACT |  PDF     Abstract Views: 212  |  PDF Views: 1