Table of Contents
Vol 8, No 5 (2016)
Open Access
Subscription Access
Articles
A Secure - Acknowledgment Based Detection Approach for MANET’S | ||
V. Sathya | ||
Vol 8, No 5 (2016), Pagination: 153-162 | ||
ABSTRACT | PDF | Abstract Views: 225 | PDF Views: 0 |
A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs | ||
K. Gayathri, S. Sivachandiran | ||
Vol 8, No 5 (2016), Pagination: 163-167 | ||
ABSTRACT | PDF | Abstract Views: 221 | PDF Views: 0 |
Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique | ||
M. Sudha, Neelima Jhavar | ||
Vol 8, No 5 (2016), Pagination: 168-172 | ||
ABSTRACT | PDF | Abstract Views: 201 | PDF Views: 0 |
Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network | ||
P. Jenis, P. K. Poonguzhali, M. Jeeva Jebakani | ||
Vol 8, No 5 (2016), Pagination: 173-175 | ||
ABSTRACT | PDF | Abstract Views: 234 | PDF Views: 0 |
Security Using RSA Algorithm in Opportunistic Localization for Underwater Sensor Networks | ||
P. Vijayalakshmi, S. B. Saritha | ||
Vol 8, No 5 (2016), Pagination: 176-179 | ||
ABSTRACT | PDF | Abstract Views: 234 | PDF Views: 0 |
A Study on Authentication Challenges & Approaches | ||
C. Subramanian, S. Stephen Raj | ||
Vol 8, No 5 (2016), Pagination: 180-182 | ||
ABSTRACT | PDF | Abstract Views: 224 | PDF Views: 2 |
Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography | ||
K. Saranya, P. Kavitha | ||
Vol 8, No 5 (2016), Pagination: 183-186 | ||
ABSTRACT | PDF | Abstract Views: 219 | PDF Views: 2 |
Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network | ||
T. K. Ujina, Sai Shanmuga Raja | ||
Vol 8, No 5 (2016), Pagination: 187-191 | ||
ABSTRACT | PDF | Abstract Views: 218 | PDF Views: 2 |
A Study on Innovative Testing Techniques | ||
S. Somasundaram | ||
Vol 8, No 5 (2016), Pagination: 192-194 | ||
ABSTRACT | PDF | Abstract Views: 220 | PDF Views: 4 |
Semi Trusted Third Party Using Dynamic Grid System for Location Based Services | ||
Rupa Debnath, G. Senthil Velan | ||
Vol 8, No 5 (2016), Pagination: 195-199 | ||
ABSTRACT | PDF | Abstract Views: 228 | PDF Views: 2 |
Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage | ||
S. Nalini Poornima, R. S. Ponmagal | ||
Vol 8, No 5 (2016), Pagination: 200-204 | ||
ABSTRACT | PDF | Abstract Views: 211 | PDF Views: 4 |