Browse Title Index


 
Issue Title
 
Vol 3, No 6 (2011) Gaze-based Password Entry Systems Abstract
S. Yamini
 
Vol 4, No 13 (2012) Generic Framework for IP Based Mobility Analysis and Hostname Tracking based Intrusion Detection Abstract
S. Arul, S. Ravi
 
Vol 3, No 1 (2011) Generic Modeling of Realistic Movement Pattern of Nodes in MANET Abstract
G. Prema, C. Aravindan, K. Kannan, R. Maheswaran
 
Vol 6, No 4 (2014) GF (2m) Based Low Complexity Multiplier for Elliptic Curve Cryptography Systems Abstract
K. Rajadurga, S. Ram Kumar
 
Vol 11, No 8 (2019) Graphical Password Authentication using Data Encryption Technique – A Review Approach Abstract
Bryan A. Liang, Khin Su Myat Moe
 
Vol 3, No 8 (2011) Grid Services Implementation Using Eclipse Environment Abstract
Madhuri Vaghsia, Sahista Machchhar, Priyanka Buch
 
Vol 7, No 7 (2015) Group Policy based Self-Destruction Data System Abstract
Poonam Patel, Amar Buchade
 
Vol 3, No 14 (2011) GT Approach for Detecting Application DoS Attacks Abstract
D. Jebakumar Immanuel, C. Sangeetha
 
Vol 7, No 7 (2015) Guidelines for Security in Cloud Computing Abstract
S. K. Srivatsa, S. Nagasundaram
 
Vol 9, No 1 (2017) Handling of Cloud Computing Audit Logs using Data Mining Techniques Abstract
S. Revathi
 
Vol 2, No 2 (2010) Handover Initiation in 3G/WLAN Integrated Networks Abstract
K. Ayyappan, R. Surender, R. Kumar
 
Vol 11, No 3 (2019) Hardware Based Braille Pad on Mobile Phone Abstract
S. Latha Shanmuga Vadivu, S. Deepak, G. Dinesh Kumar, M. Mohammed Sabeek, S. Navaneetha Krishnan
 
Vol 3, No 2 (2011) Heuristics Based Survey on Workflow Scheduling in Computational Grids Abstract
E. Saravana Kumar, A. Sumathi
 
Vol 9, No 4 (2017) Hierarchical Cluster Based Efficient Data Acquisition and Detection of Smart Attackers Using IDS Abstract
V. Bharathi, A. Gokila
 
Vol 2, No 4 (2010) High Performance Internet Security Cryptographic Functions through OpenSSL Abstract
T. Vijayalakshmi, K. G. Sathiya
 
Vol 2, No 1 (2010) High Speed Reliable Serial Data Transmission Using 8B/10B Abstract
S. Jesme Topple, M. Pavithra
 
Vol 7, No 6 (2015) HONEYPOT:Network Security Abstract
A. Dayana, S. Saranya, B. Geethamani, R. Kashturi
 
Vol 4, No 3 (2012) Hybrid Approach in Information-Hypothetically Furtive Solution Generation for Vanishing Wireless Channels Abstract
J. Nagaraj, G. M. Kadhar Nawaz
 
Vol 5, No 7 (2013) Hybrid Feedback Suppression Scheme for Satellite Networks Abstract
Thokchom Arvind, R. Gunasundari
 
Vol 4, No 1 (2012) Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor Abstract
B. Muthukumar, S. Jeevananthan
 
Vol 5, No 7 (2013) Hysteresis Model for Velocity Based Handoff in Hierarchical Cellular System Abstract
K. Sivakumar, M. Tamilarasi
 
Vol 3, No 1 (2011) Identification of P2P Traffic across the Networks:A Survey Abstract
M. Sadish Sendil, M. Kavitha, U. Kaleelurrahaman, S. Karthik, N. Nagarajan
 
Vol 10, No 1 (2018) Identity Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking with Perfect Data in Public Cloud Abstract
P. Jayasree, V. Saravanan
 
Vol 2, No 12 (2010) Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network Abstract
Madhumathi Rajesh, Rama Sugavanam, G. R. Gangadevi
 
Vol 4, No 14 (2012) Impact of Fiber Raman Amplifier (FRA) in DCF Based High Speed WDM System Abstract
Vishal Sharma, Sunil Kumar Gautam
 
476 - 500 of 922 Items First Previous 15 16 17 18 19 20 21 22 23 24 Next Last