Issue | Title | |
Vol 3, No 6 (2011) | Gaze-based Password Entry Systems | Abstract |
S. Yamini | ||
Vol 4, No 13 (2012) | Generic Framework for IP Based Mobility Analysis and Hostname Tracking based Intrusion Detection | Abstract |
S. Arul, S. Ravi | ||
Vol 3, No 1 (2011) | Generic Modeling of Realistic Movement Pattern of Nodes in MANET | Abstract |
G. Prema, C. Aravindan, K. Kannan, R. Maheswaran | ||
Vol 6, No 4 (2014) | GF (2m) Based Low Complexity Multiplier for Elliptic Curve Cryptography Systems | Abstract |
K. Rajadurga, S. Ram Kumar | ||
Vol 11, No 8 (2019) | Graphical Password Authentication using Data Encryption Technique – A Review Approach | Abstract |
Bryan A. Liang, Khin Su Myat Moe | ||
Vol 3, No 8 (2011) | Grid Services Implementation Using Eclipse Environment | Abstract |
Madhuri Vaghsia, Sahista Machchhar, Priyanka Buch | ||
Vol 7, No 7 (2015) | Group Policy based Self-Destruction Data System | Abstract |
Poonam Patel, Amar Buchade | ||
Vol 3, No 14 (2011) | GT Approach for Detecting Application DoS Attacks | Abstract |
D. Jebakumar Immanuel, C. Sangeetha | ||
Vol 7, No 7 (2015) | Guidelines for Security in Cloud Computing | Abstract |
S. K. Srivatsa, S. Nagasundaram | ||
Vol 9, No 1 (2017) | Handling of Cloud Computing Audit Logs using Data Mining Techniques | Abstract |
S. Revathi | ||
Vol 2, No 2 (2010) | Handover Initiation in 3G/WLAN Integrated Networks | Abstract |
K. Ayyappan, R. Surender, R. Kumar | ||
Vol 11, No 3 (2019) | Hardware Based Braille Pad on Mobile Phone | Abstract |
S. Latha Shanmuga Vadivu, S. Deepak, G. Dinesh Kumar, M. Mohammed Sabeek, S. Navaneetha Krishnan | ||
Vol 3, No 2 (2011) | Heuristics Based Survey on Workflow Scheduling in Computational Grids | Abstract |
E. Saravana Kumar, A. Sumathi | ||
Vol 9, No 4 (2017) | Hierarchical Cluster Based Efficient Data Acquisition and Detection of Smart Attackers Using IDS | Abstract |
V. Bharathi, A. Gokila | ||
Vol 2, No 4 (2010) | High Performance Internet Security Cryptographic Functions through OpenSSL | Abstract |
T. Vijayalakshmi, K. G. Sathiya | ||
Vol 2, No 1 (2010) | High Speed Reliable Serial Data Transmission Using 8B/10B | Abstract |
S. Jesme Topple, M. Pavithra | ||
Vol 7, No 6 (2015) | HONEYPOT:Network Security | Abstract |
A. Dayana, S. Saranya, B. Geethamani, R. Kashturi | ||
Vol 4, No 3 (2012) | Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels | Abstract |
J. Nagaraj, G. M. Kadhar Nawaz | ||
Vol 5, No 7 (2013) | Hybrid Feedback Suppression Scheme for Satellite Networks | Abstract |
Thokchom Arvind, R. Gunasundari | ||
Vol 4, No 1 (2012) | Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor | Abstract |
B. Muthukumar, S. Jeevananthan | ||
Vol 5, No 7 (2013) | Hysteresis Model for Velocity Based Handoff in Hierarchical Cellular System | Abstract |
K. Sivakumar, M. Tamilarasi | ||
Vol 3, No 1 (2011) | Identification of P2P Traffic across the Networks:A Survey | Abstract |
M. Sadish Sendil, M. Kavitha, U. Kaleelurrahaman, S. Karthik, N. Nagarajan | ||
Vol 10, No 1 (2018) | Identity Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking with Perfect Data in Public Cloud | Abstract |
P. Jayasree, V. Saravanan | ||
Vol 2, No 12 (2010) | Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network | Abstract |
Madhumathi Rajesh, Rama Sugavanam, G. R. Gangadevi | ||
Vol 4, No 14 (2012) | Impact of Fiber Raman Amplifier (FRA) in DCF Based High Speed WDM System | Abstract |
Vishal Sharma, Sunil Kumar Gautam | ||
476 - 500 of 922 Items | First Previous 15 16 17 18 19 20 21 22 23 24 Next Last |
Browse Title Index
Scroll