Issue | Title | |
Vol 5, No 3 (2013) | Mitigation of Flooding Attack Using Defense Mechanism in Mobile Adhoc Networks | Abstract |
M. Muthu Meenakshi, P. Subathra | ||
Vol 6, No 6 (2014) | Mixing Substitution and Transposition Method for Enhancing Security | Abstract |
Tanvi | ||
Vol 3, No 5 (2011) | Mobile Agent Based Cooperative Intrusion Detection System and Minimization of Malicious Packet Losses | Abstract |
J. Arokia Renjit, K. L Shunmuganathan | ||
Vol 4, No 9 (2012) | Mobile Communication:SMS Security Review (Issues, Attacks and Preventive Measures) | Abstract |
Gurjeet Kaur, Monika Sachdeva, K. K. Saluja | ||
Vol 9, No 1 (2017) | Mobile Computing | Abstract |
S. Jagadesh Kumar, R. Mahesh Kumar | ||
Vol 4, No 2 (2012) | MODBUS–An Overview and Applications in Automation Supporting ASCII and RTU Mode Transmission | Abstract |
P. M. Patil, Sameer S. Nagtilak | ||
Vol 4, No 15 (2012) | Modeling and Simulation of EPON Based Symmetric FTTH Access Network | Abstract |
Vishal Sharma, Amrita Tyagi | ||
Vol 3, No 3 (2011) | Modeling and Study of Shielding Effectiveness of Enclosure | Abstract |
G. Sindura, P. Salil, K. Ram Prakash | ||
Vol 3, No 7 (2011) | Modeling RTT Using Box-Jenkins Model | Abstract |
A. Jeyasekar, S. V. Kasmir Raja | ||
Vol 4, No 5 (2012) | Modeling, Simulation and Capacity Analysis of Spatially Correlated Channels in MIMO Systems | Abstract |
Prasad Rayi, D. Madhusudan, Ch. Madhusudhan | ||
Vol 2, No 1 (2010) | Modelling and Control of a Grid Connected Small Scale Wind Generation System | Abstract |
J. Divya Navamani, A. Lavanya | ||
Vol 4, No 1 (2012) | Monitoring and Control System for Precision Farming using WSN | Abstract |
Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka, Komal | ||
Vol 4, No 3 (2012) | Monitoring and Mitigation of Application Layer DDOS Attacks through Heuristic Methods | Abstract |
C. Nithyanand Niranjan, E. Pooventhan | ||
Vol 6, No 6 (2014) | Most Wanted Content Management Systems for Website Development | Abstract |
Bhumika S. Zalavadia | ||
Vol 3, No 5 (2011) | Motion Capture for Computer 3D Character Animation | Abstract |
G. Dheepa, S. Sukumaran, K. Prabha | ||
Vol 6, No 9 (2014) | MRESS:A Good Epoch-Oriented Course-Plotting Management Airplane for Low-Power Along with Lossy Networks | Abstract |
H. Ambika, S. Suguna, N. Kavitha, A. Daison Raj | ||
Vol 8, No 10 (2016) | MTM-Multihomed Transition Mechanism Feature for Small and Medium Enterprise Network | Abstract |
B. I. D. Kumar, G. Vasanth | ||
Vol 7, No 1 (2015) | Multi Authority Ciphertext Policy Attribute Based Encryption Schemes with Constant Ciphertext Length:A Survey | Abstract |
Nikita Gorasia, R. R. Srikanth, Nishant Doshi | ||
Vol 4, No 9 (2012) | Multi Factor Authentication using Steganography and One Time Password | Abstract |
S. Arun Kumar, S. Vijayakumari, B. Dharani Chander | ||
Vol 10, No 6 (2018) | Multi Stage Secret Sharing Scheme uses Lattices based Cryptography System | Abstract |
N. M. Abroja, A. Afila Parveen, E. Ranjith | ||
Vol 3, No 13 (2011) | Multicast Multi-Path Power Efficient Routing in MANET | Abstract |
M. Raghavendra Rao, K. Eswar, P. Harini, Syed. Azhad | ||
Vol 5, No 11 (2013) | Multilayer Data Security Model for Handheld Devices with Simple Encryption Technique and Hardware Software Co-Design | Abstract |
J. D. Ansilla Bensam, N. Vasudevan, S. Ravi | ||
Vol 4, No 5 (2012) | Multimedia Access Community for Unstructured P2P Networks | Abstract |
M. Manikandaprabu, R. Gnanakumaran, R. Gopinath | ||
Vol 6, No 8 (2014) | Multi-Party Electronic Payment System Using ECCMA Algorithm | Abstract |
A. Udhayakumar, K. Ravikumar | ||
Vol 8, No 3 (2016) | Multi-Stage Secret Sharing Schemes Based on Asmuth’s Bloom Sequence | Abstract |
Appala Naidu Tentu, V. Kamakshi Prasad, V. Ch. Venkaiah | ||
601 - 625 of 922 Items | First Previous 20 21 22 23 24 25 26 27 28 29 Next Last |
Browse Title Index
Scroll