Vol 4, No 1 (2012)

Table of Contents

Vol 4, No 1 (2012)

Open Access Open Access  Restricted Access Subscription Access

Articles

Detecting and Isolating Malicious Packet Losses
K. Balasubramanian, R. Anandraj
 Vol 4, No 1 (2012), Pagination: 1-3
ABSTRACT |  PDF     Abstract Views: 233  |  PDF Views: 2
Traffic Facet Psychoanalysis through Cryptography for an Attack
B. Muthulakshmi
 Vol 4, No 1 (2012), Pagination: 4-7
ABSTRACT |  PDF     Abstract Views: 234  |  PDF Views: 3
Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor
B. Muthukumar, S. Jeevananthan
 Vol 4, No 1 (2012), Pagination: 8-15
ABSTRACT |  PDF     Abstract Views: 227  |  PDF Views: 2
Monitoring and Control System for Precision Farming using WSN
Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka, Komal
 Vol 4, No 1 (2012), Pagination: 16-21
ABSTRACT |  PDF     Abstract Views: 224  |  PDF Views: 3
VLSI Implementation of Data Security Architecture
Dilip Thomas, K. S. M. Panicker
 Vol 4, No 1 (2012), Pagination: 22-29
ABSTRACT |  PDF     Abstract Views: 232  |  PDF Views: 2
A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran
 Vol 4, No 1 (2012), Pagination: 30-35
ABSTRACT |  PDF     Abstract Views: 245  |  PDF Views: 1
Real-Time Wireless Sensor Network for Temperature Monitoring
Swati Mahabole, Sanjay Patil
 Vol 4, No 1 (2012), Pagination: 36-38
ABSTRACT |  PDF     Abstract Views: 253  |  PDF Views: 3