Issue | Title | |
Vol 7, No 2 (2015) | Block based Data Encryption and Decryption using Algorithmic Operations | Abstract |
Ayan Banerjee, Pranam Paul | ||
Vol 7, No 5 (2015) | Block based Data Encryption and Decryption using Number System Logic | Abstract |
Ayan Banerjee, Pranam Paul | ||
Vol 7, No 5 (2015) | Block Based Data Encryption and Decryption Using the Distance between Prime Numbers | Abstract |
Moinak Chowdhury, Pranam Paul | ||
Vol 7, No 5 (2015) | Block Cipher Encryption based on Random Substitution | Abstract |
Amit Roy, Pranam Paul | ||
Vol 4, No 13 (2012) | Blocking Probability Reduction in WDM Networks Using Convertible Wavelength Assignment Techniques | Abstract |
R. Dhaya, P. Subbulakshmi, S. Vimal, V. Jackins | ||
Vol 4, No 9 (2012) | Blocking the Misbehaving Access using Ticket Based Method in Anonymous Networks | Abstract |
C. Jackulin, D. Elavarasi, Vivian Rachel Jayson | ||
Vol 7, No 5 (2015) | CAD for Voyage Data Recorder Training Simulator | Abstract |
Mohamed Saad Zaghloul | ||
Vol 4, No 2 (2012) | Capacity Analysis of MIMO-OFDMA based Cellular Relay Networks | Abstract |
P. Rengini, R. Nakkeeran, P. Ranjith | ||
Vol 5, No 11 (2013) | Capacity Enhancement of WCDMA Network Using Utility based CAC Scheme with AMR for different Decoding Scheme | Abstract |
K. Ayyappan, R. Kumar | ||
Vol 9, No 1 (2017) | CAZAC-Clipping Technique for PAPR Reduction in Direct-Detection Optical OFDM System | Abstract |
Jaspreet Kaur, Neena Gupta | ||
Vol 8, No 1 (2016) | CBDRP:A Systematic Approach for Detection and Localization of Attacks in Wireless Communities | Abstract |
M. Premkumar, T. V. P. Sundararajan | ||
Vol 10, No 6 (2018) | Challenges for De-Identification Policies using MapReduce in Big Data | Abstract |
N. M. Abroja, P. Bhuvana, R. Sathish Kumar | ||
Vol 8, No 10 (2016) | Chaotic Maps Based Scheme for Image Authentication | Abstract |
Karanam Sreenivas, V. Kamakshiprasad | ||
Vol 6, No 3 (2014) | Chat Server:Implementation of Chat Notification to a Mobile Through Communication Network | Abstract |
S. Dhivyabharathi, S. Sarathi, P. Vasanthapriya | ||
Vol 4, No 14 (2012) | Citizen-Centric e-Healthcare Management Based on Pervasive Authentication | Abstract |
M. Regina Begam, S. Abdul Ansari, K. Sukumar | ||
Vol 9, No 2 (2017) | Classification of Healthy and ADHD Subjects Using Neural Network Classifier | Abstract |
P. Udaya Prasanth, V. Solai Revathi, O. Uma Maheswari | ||
Vol 7, No 10 (2015) | Cloud Computing Architecture, Services and Deployment Models | Abstract |
Bhumika S. Zalavadia | ||
Vol 3, No 5 (2011) | Cloud Computing: Practice of Efficient Approaches, Techniques and Challenges for Data Centers | Abstract |
S. Manimegalai, C. Sumithiradevi, M. Punithavalli | ||
Vol 4, No 6 (2012) | Cloud Computing:A Next Generation Revolution in IT with e-Governance | Abstract |
Vivek Tiwari, Umesh Bindal, Shailesh Pandey | ||
Vol 12, No 9-10 (2020) | Cloud Network for Computer Aided Diabetic Control System | Abstract |
Dejene Boru, Albert Y. Zomaya | ||
Vol 5, No 2 (2013) | Cloud SafeSys:Secure Model for Cloud Computing System | Abstract |
Vaibhav Sawant, Lakhan Relwani, Vishal Wakchaure, Harshad Gojare, Hanumant Pawar | ||
Vol 4, No 7 (2012) | Cluster-Based Adaptive Fault Tolerant QoS Routing Algorithm for Wireless Networks | Abstract |
S. A. Hafsa, R. Poornima | ||
Vol 1, No 2 (2009) | COAL: Combination of Arc Flag and Land Mark Speedup Techniques for Shortest Path queres | Abstract |
R. Kalpana, P. Thambidurai, H. Shahul Hamead | ||
Vol 6, No 6 (2014) | Collaborative Study on Recent Advances and Future Trends in Honeypot, Denial-of-Service Attack (DoS) and Distributed Denial-Of-Service Attack (DDoS) | Abstract |
Shilpi Singh, Sweta Verma, A. K. Khare | ||
Vol 5, No 12 (2013) | Comparative Performance Analysis of DSDV and AODV Routing Protocols in MANET using NS2 | Abstract |
Subhrananda Goswami, Chandan Bikash Das, Subhankar Joardar | ||
276 - 300 of 922 Items | First Previous 7 8 9 10 11 12 13 14 15 16 Next Last |
Browse Title Index
Scroll