Table of Contents
Vol 4, No 1 (2012)
Open Access
Subscription Access
Articles
Detecting and Isolating Malicious Packet Losses | ||
K. Balasubramanian, R. Anandraj | ||
Vol 4, No 1 (2012), Pagination: 1-3 | ||
ABSTRACT | PDF | Abstract Views: 233 | PDF Views: 2 |
Traffic Facet Psychoanalysis through Cryptography for an Attack | ||
B. Muthulakshmi | ||
Vol 4, No 1 (2012), Pagination: 4-7 | ||
ABSTRACT | PDF | Abstract Views: 234 | PDF Views: 3 |
Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor | ||
B. Muthukumar, S. Jeevananthan | ||
Vol 4, No 1 (2012), Pagination: 8-15 | ||
ABSTRACT | PDF | Abstract Views: 227 | PDF Views: 2 |
Monitoring and Control System for Precision Farming using WSN | ||
Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka, Komal | ||
Vol 4, No 1 (2012), Pagination: 16-21 | ||
ABSTRACT | PDF | Abstract Views: 224 | PDF Views: 3 |
VLSI Implementation of Data Security Architecture | ||
Dilip Thomas, K. S. M. Panicker | ||
Vol 4, No 1 (2012), Pagination: 22-29 | ||
ABSTRACT | PDF | Abstract Views: 232 | PDF Views: 2 |
A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks | ||
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran | ||
Vol 4, No 1 (2012), Pagination: 30-35 | ||
ABSTRACT | PDF | Abstract Views: 245 | PDF Views: 1 |
Real-Time Wireless Sensor Network for Temperature Monitoring | ||
Swati Mahabole, Sanjay Patil | ||
Vol 4, No 1 (2012), Pagination: 36-38 | ||
ABSTRACT | PDF | Abstract Views: 253 | PDF Views: 3 |