Issue | Title | |
Vol 2, No 7 (2010) | N Level Unicode Position Character Length Cipher for Securing Smart Card | Abstract |
P. Vijayakumar, M. Palanivelu, M. Latha Karthigaa, N. Balachandar, M. Karthi | ||
Vol 3, No 1 (2011) | Need for Enhanced Standards in Information Security, Cryptography | Abstract |
K. Anupama | ||
Vol 3, No 5 (2011) | Network Based Virtual Compilation–C/C++ and JAVA | Abstract |
Shiv Sutar, Umesh Mergu, Swapnil Thale | ||
Vol 3, No 14 (2011) | Network Centric Warfare-Concepts and Challenges | Abstract |
D. Anand, Raja, E. G. Rajan | ||
Vol 4, No 3 (2012) | Network Congestion Management for Improved Network Performance | Abstract |
P. Josephine Arul Priya, P. Jaikumar Aravaanan | ||
Vol 8, No 3 (2016) | Network Intrusion Detection by Finding Correlation between Multiple Features using K-Means Algorithm & Multivariate Correlation Analysis | Abstract |
Prasad Kolhe, Siddharth Bhosale, Sagar Lathe, Shubham Mane, Rashmi Bhattad | ||
Vol 3, No 15 (2011) | Network Management Systems Simulation | Abstract |
G. S. Nagaraja, Tabrez Zahoor | ||
Vol 3, No 9 (2011) | Network Monitoring Using Genetic Algorithm | Abstract |
Amit Savyanavar, Mayank Manish, Raunak Agarwal, Devanshu Gupta, Saral Jain | ||
Vol 1, No 8 (2009) | Network Performance Enhancement using New Active Queue Management | Abstract |
S. Malarvizhi, M. Madeshwaran | ||
Vol 5, No 4 (2013) | Network Reconfiguration of Distribution System Using Harmony Search Algorithm | Abstract |
T. D. Sudhakar | ||
Vol 9, No 9 (2017) | Network Security and Cryptography Techniques | Abstract |
N. Valarmathy, P. Vishnupriya | ||
Vol 3, No 10 (2011) | Network Security in Mobile AD-HOC Network (MANET) | Abstract |
R. Vassoudhevan, R. Sivagami, Z. Saffna Sarmilla, R. Divya | ||
Vol 4, No 13 (2012) | Network Security Management in Wireless Networks through 3-Round Zero Knowledge Proof | Abstract |
K. Vamsiram, I. Bala Venkateswarlu | ||
Vol 4, No 11 (2012) | Network Structure Based Routing Techniques in Wireless Sensor Networks:A Comprehensive Survey | Abstract |
Sunil Kumar Kaushik, Ruchi Aggarwal, Gourav Bathla, Pushkar Raj | ||
Vol 7, No 1 (2015) | Network Throughput Improvement using Dijkstra’s and Floyd Warshall Algorithm | Abstract |
A. Priyanka Patil, S. P. Gaikwad | ||
Vol 3, No 1 (2011) | Neural Networks Based QoS Scheduling in WiMAX | Abstract |
D. David Neels Pon Kumar, K. Murugesan, S. Raghavan, M. Suganthi | ||
Vol 3, No 14 (2011) | New Authentication Mechanism with Home Agent in Next Generation Mobile Internet Protocol - Version6 (MIPv6) | Abstract |
D. Sathish | ||
Vol 4, No 6 (2012) | New Data Encryption Standard Algorithm | Abstract |
C. V. Anchugam | ||
Vol 4, No 4 (2012) | New Encryption Standard and Particular Case of GOST Algorithm | Abstract |
Chandra Sekhar Maganty, K. Sai Prasanthi, K. Sai Sruthi | ||
Vol 3, No 11 (2011) | Novel Approach for Hiding Secret Data in Image Using Cryptic Steganography | Abstract |
R. Bala | ||
Vol 2, No 10 (2010) | Novel Approach for Medical Image Compression Using Efficient Hybrid Image Coder | Abstract |
S. Manimurugan, K. Porkumaran | ||
Vol 3, No 3 (2011) | Novel Approaches to Prevent Spams | Abstract |
Bastin Rogers, Jasmine Chandralega | ||
Vol 6, No 4 (2014) | Novel Multicast Key Authentication Protocol | Abstract |
S. Sasikala Devi, Antony Selvadoss Thanamani | ||
Vol 4, No 7 (2012) | On Power Consumption of Different FTTH Access Networks | Abstract |
Deepti Punjabi, Neena Gupta | ||
Vol 6, No 1 (2014) | On the Estimation of Attacks in Computer Networks with an AR Approach | Abstract |
Rania A. Ghazy, El-Sayed M. El-Rabaie, Moawad I. Dessouky, Nawal A. El-Feshawy, Fathi E. Abd El-Samie | ||
626 - 650 of 922 Items | First Previous 21 22 23 24 25 26 27 28 29 30 Next Last |
Browse Title Index
Scroll