Browse Title Index


 
Issue Title
 
Vol 5, No 3 (2013) Mitigation of Flooding Attack Using Defense Mechanism in Mobile Adhoc Networks Abstract
M. Muthu Meenakshi, P. Subathra
 
Vol 6, No 6 (2014) Mixing Substitution and Transposition Method for Enhancing Security Abstract
Tanvi
 
Vol 3, No 5 (2011) Mobile Agent Based Cooperative Intrusion Detection System and Minimization of Malicious Packet Losses Abstract
J. Arokia Renjit, K. L Shunmuganathan
 
Vol 4, No 9 (2012) Mobile Communication:SMS Security Review (Issues, Attacks and Preventive Measures) Abstract
Gurjeet Kaur, Monika Sachdeva, K. K. Saluja
 
Vol 9, No 1 (2017) Mobile Computing Abstract
S. Jagadesh Kumar, R. Mahesh Kumar
 
Vol 4, No 2 (2012) MODBUS–An Overview and Applications in Automation Supporting ASCII and RTU Mode Transmission Abstract
P. M. Patil, Sameer S. Nagtilak
 
Vol 4, No 15 (2012) Modeling and Simulation of EPON Based Symmetric FTTH Access Network Abstract
Vishal Sharma, Amrita Tyagi
 
Vol 3, No 3 (2011) Modeling and Study of Shielding Effectiveness of Enclosure Abstract
G. Sindura, P. Salil, K. Ram Prakash
 
Vol 3, No 7 (2011) Modeling RTT Using Box-Jenkins Model Abstract
A. Jeyasekar, S. V. Kasmir Raja
 
Vol 4, No 5 (2012) Modeling, Simulation and Capacity Analysis of Spatially Correlated Channels in MIMO Systems Abstract
Prasad Rayi, D. Madhusudan, Ch. Madhusudhan
 
Vol 2, No 1 (2010) Modelling and Control of a Grid Connected Small Scale Wind Generation System Abstract
J. Divya Navamani, A. Lavanya
 
Vol 4, No 1 (2012) Monitoring and Control System for Precision Farming using WSN Abstract
Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka, Komal
 
Vol 4, No 3 (2012) Monitoring and Mitigation of Application Layer DDOS Attacks through Heuristic Methods Abstract
C. Nithyanand Niranjan, E. Pooventhan
 
Vol 6, No 6 (2014) Most Wanted Content Management Systems for Website Development Abstract
Bhumika S. Zalavadia
 
Vol 3, No 5 (2011) Motion Capture for Computer 3D Character Animation Abstract
G. Dheepa, S. Sukumaran, K. Prabha
 
Vol 6, No 9 (2014) MRESS:A Good Epoch-Oriented Course-Plotting Management Airplane for Low-Power Along with Lossy Networks Abstract
H. Ambika, S. Suguna, N. Kavitha, A. Daison Raj
 
Vol 8, No 10 (2016) MTM-Multihomed Transition Mechanism Feature for Small and Medium Enterprise Network Abstract
B. I. D. Kumar, G. Vasanth
 
Vol 7, No 1 (2015) Multi Authority Ciphertext Policy Attribute Based Encryption Schemes with Constant Ciphertext Length:A Survey Abstract
Nikita Gorasia, R. R. Srikanth, Nishant Doshi
 
Vol 4, No 9 (2012) Multi Factor Authentication using Steganography and One Time Password Abstract
S. Arun Kumar, S. Vijayakumari, B. Dharani Chander
 
Vol 10, No 6 (2018) Multi Stage Secret Sharing Scheme uses Lattices based Cryptography System Abstract
N. M. Abroja, A. Afila Parveen, E. Ranjith
 
Vol 3, No 13 (2011) Multicast Multi-Path Power Efficient Routing in MANET Abstract
M. Raghavendra Rao, K. Eswar, P. Harini, Syed. Azhad
 
Vol 5, No 11 (2013) Multilayer Data Security Model for Handheld Devices with Simple Encryption Technique and Hardware Software Co-Design Abstract
J. D. Ansilla Bensam, N. Vasudevan, S. Ravi
 
Vol 4, No 5 (2012) Multimedia Access Community for Unstructured P2P Networks Abstract
M. Manikandaprabu, R. Gnanakumaran, R. Gopinath
 
Vol 6, No 8 (2014) Multi-Party Electronic Payment System Using ECCMA Algorithm Abstract
A. Udhayakumar, K. Ravikumar
 
Vol 8, No 3 (2016) Multi-Stage Secret Sharing Schemes Based on Asmuth’s Bloom Sequence Abstract
Appala Naidu Tentu, V. Kamakshi Prasad, V. Ch. Venkaiah
 
601 - 625 of 922 Items First Previous 20 21 22 23 24 25 26 27 28 29 Next Last