Table of Contents
Vol 3, No 6 (2011)
Open Access
Subscription Access
Articles
Virtual Password Obscuring in Avoidance of Keyloggers | ||
J. Jeysree | ||
Vol 3, No 6 (2011), Pagination: 371-374 | ||
ABSTRACT | PDF | Abstract Views: 251 | PDF Views: 3 |
Improving the Performance of Interactive TCP Applications using End-Point Techniques | ||
Varun G. Menon, Alfred Raja Melvin | ||
Vol 3, No 6 (2011), Pagination: 375-379 | ||
ABSTRACT | PDF | Abstract Views: 231 | PDF Views: 2 |
A New Protocol Stack for 6LoWPAN–An Overview | ||
R. B. Jagadeesha | ||
Vol 3, No 6 (2011), Pagination: 380-389 | ||
ABSTRACT | PDF | Abstract Views: 233 | PDF Views: 1 |
LIGHTMQ Provider for Java Message Service | ||
Sushila Aghav, Shailesh Deshpande, Prajyot Jadhav | ||
Vol 3, No 6 (2011), Pagination: 390-395 | ||
ABSTRACT | PDF | Abstract Views: 220 | PDF Views: 1 |
Workflow Based Resource Allocation and Monitoring Using Mobile Agents | ||
L. Venkatakrishnan, T. V. U. Kiran Kumar, M. A. Dorairengaswamy | ||
Vol 3, No 6 (2011), Pagination: 396-400 | ||
ABSTRACT | PDF | Abstract Views: 216 | PDF Views: 3 |
Gaze-based Password Entry Systems | ||
S. Yamini | ||
Vol 3, No 6 (2011), Pagination: 401-403 | ||
ABSTRACT | PDF | Abstract Views: 225 | PDF Views: 3 |
A Survey of Peer To Peer Network | ||
R. Maruthaveni, S. kalaivani | ||
Vol 3, No 6 (2011), Pagination: 404-407 | ||
ABSTRACT | PDF | Abstract Views: 210 | PDF Views: 3 |
Improved Cyber Security by Hardware Acceleration of Scalable Encryption Algorithm in OpenSSL | ||
A. Thiruneelakandan, N. Hemavathy | ||
Vol 3, No 6 (2011), Pagination: 408-414 | ||
ABSTRACT | PDF | Abstract Views: 245 | PDF Views: 3 |
An Efficient Reliable Protocol in AD-Hoc Network Using A Cross Layer Approach via TCP | ||
R. Thamizhamuthu, G. Ilanchezhia Pandian, P. Sheik Abdul Khader | ||
Vol 3, No 6 (2011), Pagination: 415-417 | ||
ABSTRACT | PDF | Abstract Views: 248 | PDF Views: 3 |
Automatic River Pollutant Monitoring & Flood Detection Using Sensor Web | ||
G. Srinivasan, L. Prabahar, B. Muthukrishnavinayagam | ||
Vol 3, No 6 (2011), Pagination: 418-423 | ||
ABSTRACT | PDF | Abstract Views: 367 | PDF Views: 3 |
Adaptive Routing for QoS in Manet by Using Cross Layer Architecture | ||
P. Chitra, G. Ilanchezhia Pandian, P. Sheik Abdul Khader | ||
Vol 3, No 6 (2011), Pagination: 424-426 | ||
ABSTRACT | PDF | Abstract Views: 239 | PDF Views: 1 |
Privacy Protected Query Processing using Advanced Location Based Service | ||
U. Nithyapriya, M. Kalimuthu | ||
Vol 3, No 6 (2011), Pagination: 427-432 | ||
ABSTRACT | PDF | Abstract Views: 218 | PDF Views: 1 |
An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms | ||
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo | ||
Vol 3, No 6 (2011), Pagination: 433-435 | ||
ABSTRACT | PDF | Abstract Views: 213 | PDF Views: 3 |
A Quarantine Model for Malicious Objects in Computer Network | ||
Aditya Kumar Singh, Bimal Kumar Mishra | ||
Vol 3, No 6 (2011), Pagination: 436-440 | ||
ABSTRACT | PDF | Abstract Views: 227 | PDF Views: 1 |
A Distributed Time Delay Model of Worms in Computer Network | ||
Samir Kumar Pandey, Bimal Kumar Mishra, Prasanna Kumar Satpathy | ||
Vol 3, No 6 (2011), Pagination: 441-447 | ||
ABSTRACT | PDF | Abstract Views: 408 | PDF Views: 1 |