Issue | Title | |
Vol 1, No 4 (2009) | Securing WLAN Using Reconfigurable YAGI Antenna | Abstract |
P. Muthu Kannan, V. Palanisamy, R. Swaminathan | ||
Vol 3, No 14 (2011) | Security Analysis in Graphical Password Schemes | Abstract |
S. Yamini | ||
Vol 4, No 14 (2012) | Security and Analysis for Batch Transparency and Dynamic Storage in Cloud Computing | Abstract |
R. Gnanajeyaraman, A. S. Deepumon, Vishnuthulasidharan | ||
Vol 10, No 8 (2018) | Security and Privacy Issues in Cloud Computing | Abstract |
R. Pooja, G. Sasikala | ||
Vol 2, No 9 (2010) | Security Enhancement of Multimedia System by Means of Novel Multiple Huffman Tables Approach | Abstract |
P. Raveendra Babu, V. Praveen Kumar, M. Samuel John, J. Ranga Rao | ||
Vol 10, No 4 (2018) | Security for Image Processing Uses AES in MANET | Abstract |
N. M. Abroja, K. Shaheena Banu, R. Ambikapathy | ||
Vol 3, No 1 (2011) | Security for Web Applications Using Wiretap Library | Abstract |
Vanitha Akinapalli, A. Sanjeeva Raju, Shylaja Akinapally, K. Madhavi | ||
Vol 5, No 9 (2013) | Security in Mobile Grid Systems:A Review | Abstract |
Grantej Otari, Vijay Ghorpadeb | ||
Vol 6, No 1 (2014) | Security in VoIP | Abstract |
Elsayed M. Elshamy, Osama S. Faragalla, Sayed El-Rabaie, Osama Elshakankiry, Fathi Sayed | ||
Vol 3, No 9 (2011) | Security Issues and Milestones in Cloud Infrastructure | Abstract |
S. Subbiah, T. Sowkarthika | ||
Vol 1, No 7 (2009) | Security Issues for Hand-Held Devices in the New Era of Mobile Computing | Abstract |
Ravindra Patel, Vishnu Sharma, Ratnesh Litoriya | ||
Vol 10, No 10 (2018) | Security Issues in Wireless Sensor Network and Healthcare Related Applications | Abstract |
P. Anushree, N.G. Harish Kumar, S. Sarathambekai | ||
Vol 4, No 5 (2012) | Security Issues Using Multi Clouds | Abstract |
R. Kavitha | ||
Vol 11, No 3 (2019) | Security System using Steganopin | Abstract |
M. Preethirani, K. K. Vaishnavi, D. Monisha rajakumari, L. Gowri, E. Madura | ||
Vol 8, No 5 (2016) | Security Using RSA Algorithm in Opportunistic Localization for Underwater Sensor Networks | Abstract |
P. Vijayalakshmi, S. B. Saritha | ||
Vol 2, No 11 (2010) | Security-Enhanced Dynamic Routing with Cryptographic Techniques | Abstract |
V. Soumya, M. A. Jabbar, T. Nagalakshmi | ||
Vol 5, No 3 (2013) | Selection of Stable Route Under MANET by Using Randam Direction Mobility Model | Abstract |
S. Sasikumar, S. Sudha | ||
Vol 4, No 8 (2012) | Self Healing Reconfigurable Unit for Error Detection and Correction in Networks | Abstract |
S. P. Anandaraj, S. Ravi, V. Chanthan | ||
Vol 7, No 9 (2015) | Self Service Mesh Router for Wireless Mesh Network with Missed Workstation Detection | Abstract |
S. Jagadeesan, R. Vinodhini, J. Sindhuja, J. Jayasudha | ||
Vol 2, No 1 (2010) | Semantic Information Processing into Enriched WordNet Using Word Sense Disambiguation | Abstract |
D. Sindhu Suvitha, R. Janarthanan | ||
Vol 8, No 5 (2016) | Semi Trusted Third Party Using Dynamic Grid System for Location Based Services | Abstract |
Rupa Debnath, G. Senthil Velan | ||
Vol 9, No 6 (2017) | Sensor Node Failure Affecting Coverage of WSNs: An Overview | Abstract |
Chaitanya Vijaykumar Mahamuni | ||
Vol 3, No 9 (2011) | Service Categorization and Admission Control in Enterprise Web Services Using Capacity Distribution Algorithm | Abstract |
I. Arul Sahaya Mary, K. Kalaivani, G. Arul Selvan, R. Manivannan | ||
Vol 3, No 15 (2011) | Service Driven Query Routing for Wireless Sensor Networks | Abstract |
V. Vanitha, V. Palanisamy, K. Baskaran | ||
Vol 6, No 5 (2014) | Setting Up Based Private Cloud Using Open Stack | Abstract |
D. Anish Nirmal, K. Arunkumar, V. Girish, R. Arunkumar | ||
801 - 825 of 922 Items | First Previous 28 29 30 31 32 33 34 35 36 37 Next Last |
Browse Title Index
Scroll