Table of Contents
Vol 4, No 1 (2012)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Articles
Detecting and Isolating Malicious Packet Losses | ||
K. Balasubramanian, R. Anandraj | ||
Vol 4, No 1 (2012), Pagination: 1-3 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 197 | PDF Views: 2 |
Traffic Facet Psychoanalysis through Cryptography for an Attack | ||
B. Muthulakshmi | ||
Vol 4, No 1 (2012), Pagination: 4-7 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 191 | PDF Views: 3 |
Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor | ||
B. Muthukumar, S. Jeevananthan | ||
Vol 4, No 1 (2012), Pagination: 8-15 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 183 | PDF Views: 2 |
Monitoring and Control System for Precision Farming using WSN | ||
Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka, Komal | ||
Vol 4, No 1 (2012), Pagination: 16-21 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 183 | PDF Views: 3 |
VLSI Implementation of Data Security Architecture | ||
Dilip Thomas, K. S. M. Panicker | ||
Vol 4, No 1 (2012), Pagination: 22-29 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 189 | PDF Views: 2 |
A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks | ||
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran | ||
Vol 4, No 1 (2012), Pagination: 30-35 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 200 | PDF Views: 1 |
Real-Time Wireless Sensor Network for Temperature Monitoring | ||
Swati Mahabole, Sanjay Patil | ||
Vol 4, No 1 (2012), Pagination: 36-38 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 215 | PDF Views: 3 |