Issue | Title | |
Vol 4, No 11 (2012) | Anomaly Detection using Spatio-Temporal Measures | Abstract |
Syed Azahad, R. Lakshmi Tulasi | ||
Vol 10, No 5 (2018) | Anonymous is my Name-A Survey Paper on Dark Web | Abstract |
B. R. Kavya, G. R. Vaishnavi, N. Sushmitha | ||
Vol 3, No 13 (2011) | Ant Agent Semantic Query Routing in Peer to Peer Networks | Abstract |
U. V. Arivazhagu, S. Srinivasan | ||
Vol 3, No 7 (2011) | Ant Based Route Optimization for FTP Protocol | Abstract |
Suvarna Joshi, Snehal Neharkar, Poonam Baviskar, Pramila Gaidhani, Varsha Koli | ||
Vol 4, No 15 (2012) | Ant Net Based Efficient Load Balance Using ASA Routing Metric | Abstract |
K. Jeya Sudha, M. Santhiya | ||
Vol 2, No 8 (2010) | AODV-TP and Wormhole Attack Detection in MANET | Abstract |
Yogendra Kumar Jain, Bhavana Gupta | ||
Vol 2, No 8 (2010) | Application of Hybrid ARQ to Controller Area Networks | Abstract |
Ashish M. Ekatpure, Meenal R. Majge | ||
Vol 4, No 15 (2012) | Application of Logistic Equations for Generation of Symmetric Keys in Cryptography | Abstract |
C. Jeyamala, S. Selvameena, R. Subhasri, T. S. R. Rajanika | ||
Vol 3, No 8 (2011) | Application of Markovian in Point to Point Networks with Multiple Controllers Using Nash Equilibrium | Abstract |
K. Sivaselvan, C. Vijayalakshmi | ||
Vol 7, No 7 (2015) | Architectural Analysis for Improving Security using LBS with ATAM | Abstract |
Almas Begum, V. Cyrilraj | ||
Vol 7, No 6 (2015) | Authenticated Anonymous Secure Routing for Mobile Adhoc Networks | Abstract |
K. Geetha Nandhini, A. Anu Priya, C. Kiruthika, B. Deepa | ||
Vol 5, No 3 (2013) | Authenticating Ranked Keyword Search and Supporting Score Dynamics | Abstract |
S. P. Ramya, G. Alaiyarasi | ||
Vol 3, No 12 (2011) | Authentication Scheme for Multi-Server Environment | Abstract |
R. Ganesan, A. Arul Lawrence Selvakumar | ||
Vol 11, No 2 (2019) | Automatic Fault Detection in Transmission Lines using GSM Technology | Abstract |
S. Kamaleshwari, T. Nandhakumar, A. Selvakumar | ||
Vol 3, No 6 (2011) | Automatic River Pollutant Monitoring & Flood Detection Using Sensor Web | Abstract |
G. Srinivasan, L. Prabahar, B. Muthukrishnavinayagam | ||
Vol 11, No 1 (2019) | Balanced Routes for Efficiency in the Information Centric Networks | Abstract |
M. Hoseini, Sh. Jamali | ||
Vol 4, No 7 (2012) | BER Analysis of Wireless Optical CDMA LAN Using Prime Codes and Extended Prime Codes | Abstract |
R. Kanmani, K. Sankaranarayanan | ||
Vol 4, No 12 (2012) | BER and Phase Noise Measurement of Radio over Fiber System based on RF Oscillator Line Width | Abstract |
Neha Sharma, Parvin Kumar Kaushik, Silky, Sunil Kr. Kaushik | ||
Vol 5, No 2 (2013) | BER and Throughput Performance Analysis of Long Term Evolution Uplink Physical Layer | Abstract |
Sikkandar Ali Vashik Ali, S. P. K. Babu | ||
Vol 2, No 5 (2010) | Bi-Intentional Fault-Tolerant Model for Workflow Scheduling on Grids | Abstract |
S. Sridevi, P. Golda Jeyasheeli | ||
Vol 7, No 6 (2015) | Bilinear Aggregate Signature and PDP Encryption in Audit Service for Cloud Storage | Abstract |
B. Premkumar, R. S. Ponmagal | ||
Vol 5, No 6 (2013) | Biometric Cloud-Based Ration Card System Using RFID and GSM Technology | Abstract |
K. Bala Karthik | ||
Vol 4, No 5 (2012) | Black Hole Password Security | Abstract |
S. Lakshmi Prabha, D. Bhuvanesh, S. Dinakar, S. Rajaranganathan | ||
Vol 7, No 3 (2015) | Block based Cryptographic Protocol using Sequence of Rearrangement of Points | Abstract |
Rajat Kumar Das, Pranam Paul | ||
Vol 7, No 5 (2015) | Block based Cryptographic Protocol with Arithmetic Operations | Abstract |
Rajat Kumar Das, Pranam Paul | ||
251 - 275 of 922 Items | First Previous 6 7 8 9 10 11 12 13 14 15 Next Last |
Browse Title Index
Scroll