Browse Title Index


 
Issue Title
 
Vol 2, No 7 (2010) N Level Unicode Position Character Length Cipher for Securing Smart Card Abstract
P. Vijayakumar, M. Palanivelu, M. Latha Karthigaa, N. Balachandar, M. Karthi
 
Vol 3, No 1 (2011) Need for Enhanced Standards in Information Security, Cryptography Abstract
K. Anupama
 
Vol 3, No 5 (2011) Network Based Virtual Compilation–C/C++ and JAVA Abstract
Shiv Sutar, Umesh Mergu, Swapnil Thale
 
Vol 3, No 14 (2011) Network Centric Warfare-Concepts and Challenges Abstract
D. Anand, Raja, E. G. Rajan
 
Vol 4, No 3 (2012) Network Congestion Management for Improved Network Performance Abstract
P. Josephine Arul Priya, P. Jaikumar Aravaanan
 
Vol 8, No 3 (2016) Network Intrusion Detection by Finding Correlation between Multiple Features using K-Means Algorithm & Multivariate Correlation Analysis Abstract
Prasad Kolhe, Siddharth Bhosale, Sagar Lathe, Shubham Mane, Rashmi Bhattad
 
Vol 3, No 15 (2011) Network Management Systems Simulation Abstract
G. S. Nagaraja, Tabrez Zahoor
 
Vol 3, No 9 (2011) Network Monitoring Using Genetic Algorithm Abstract
Amit Savyanavar, Mayank Manish, Raunak Agarwal, Devanshu Gupta, Saral Jain
 
Vol 1, No 8 (2009) Network Performance Enhancement using New Active Queue Management Abstract
S. Malarvizhi, M. Madeshwaran
 
Vol 5, No 4 (2013) Network Reconfiguration of Distribution System Using Harmony Search Algorithm Abstract
T. D. Sudhakar
 
Vol 9, No 9 (2017) Network Security and Cryptography Techniques Abstract
N. Valarmathy, P. Vishnupriya
 
Vol 3, No 10 (2011) Network Security in Mobile AD-HOC Network (MANET) Abstract
R. Vassoudhevan, R. Sivagami, Z. Saffna Sarmilla, R. Divya
 
Vol 4, No 13 (2012) Network Security Management in Wireless Networks through 3-Round Zero Knowledge Proof Abstract
K. Vamsiram, I. Bala Venkateswarlu
 
Vol 4, No 11 (2012) Network Structure Based Routing Techniques in Wireless Sensor Networks:A Comprehensive Survey Abstract
Sunil Kumar Kaushik, Ruchi Aggarwal, Gourav Bathla, Pushkar Raj
 
Vol 7, No 1 (2015) Network Throughput Improvement using Dijkstra’s and Floyd Warshall Algorithm Abstract
A. Priyanka Patil, S. P. Gaikwad
 
Vol 3, No 1 (2011) Neural Networks Based QoS Scheduling in WiMAX Abstract
D. David Neels Pon Kumar, K. Murugesan, S. Raghavan, M. Suganthi
 
Vol 3, No 14 (2011) New Authentication Mechanism with Home Agent in Next Generation Mobile Internet Protocol - Version6 (MIPv6) Abstract
D. Sathish
 
Vol 4, No 6 (2012) New Data Encryption Standard Algorithm Abstract
C. V. Anchugam
 
Vol 4, No 4 (2012) New Encryption Standard and Particular Case of GOST Algorithm Abstract
Chandra Sekhar Maganty, K. Sai Prasanthi, K. Sai Sruthi
 
Vol 3, No 11 (2011) Novel Approach for Hiding Secret Data in Image Using Cryptic Steganography Abstract
R. Bala
 
Vol 2, No 10 (2010) Novel Approach for Medical Image Compression Using Efficient Hybrid Image Coder Abstract
S. Manimurugan, K. Porkumaran
 
Vol 3, No 3 (2011) Novel Approaches to Prevent Spams Abstract
Bastin Rogers, Jasmine Chandralega
 
Vol 6, No 4 (2014) Novel Multicast Key Authentication Protocol Abstract
S. Sasikala Devi, Antony Selvadoss Thanamani
 
Vol 4, No 7 (2012) On Power Consumption of Different FTTH Access Networks Abstract
Deepti Punjabi, Neena Gupta
 
Vol 6, No 1 (2014) On the Estimation of Attacks in Computer Networks with an AR Approach Abstract
Rania A. Ghazy, El-Sayed M. El-Rabaie, Moawad I. Dessouky, Nawal A. El-Feshawy, Fathi E. Abd El-Samie
 
626 - 650 of 922 Items First Previous 21 22 23 24 25 26 27 28 29 30 Next Last