Browse Title Index


 
Issue Title
 
Vol 3, No 11 (2011) Routing Protocols for Ad Hoc Mobile Wireless Networks:A Comparative Study Abstract
Vishnu Kumar Sharma, Sarita Singh Bhadauria
 
Vol 5, No 6 (2013) Rural Development via Communication (Wire Architecture) Abstract
R. Maheswari, T. V. U. Kirankumar, S. Kannappan
 
Vol 4, No 8 (2012) Saving Energy in Mobile Devices with WLAN and Bluetooth Interfaces using Cooperative Clustering Network Abstract
B. RasinaBegum, R. Karthikeyan
 
Vol 6, No 7 (2014) Secure and Robust Localization in Wireless Network Protection Abstract
S. Jagadeesan
 
Vol 8, No 5 (2016) Secure and Scalable Sensor Data Access Network with Delay Tolerance Abstract
P. Saranya, Dr. R. S. Ponmagal
 
Vol 7, No 4 (2015) Secure Data Share in Drop Box Using Key-Aggregate Cryptosystem Abstract
E. Elamathi, Aroky Raju, K. Ravikumar
 
Vol 7, No 3 (2015) Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication Abstract
S. RamaLakshmi, V. Suganya, B. Saranya, V. Srinivasan
 
Vol 4, No 12 (2012) Secure Data Transmission in Wireless Sensor Networks using Randomized Dispersive Paths Abstract
Dhirajkumar Shelke, Pushkar Sathe, Omkar Sabane, Vinod Sawant
 
Vol 5, No 11 (2013) Secure Data Transmission Using Cloud Computing Abstract
Trinath Naralasetty, K. Eswar
 
Vol 7, No 7 (2015) Secure Deduplication with Reliable Convergent Key Management in Hybrid Cloud Abstract
M. Gomathi Pradeepa, S. Geetha
 
Vol 8, No 3 (2016) Secure Group Sharing in Dynamic Public Cloud Environment Abstract
R. Santhosh, M. Veeramanikandan
 
Vol 7, No 7 (2015) Secure Image Steganography Combined with DES Encryption Abstract
K. Veeramanikandan, P. Manjamadevi, K. Latha
 
Vol 6, No 9 (2014) Secure Information Distribution in Cloud Computing Abstract
C. Leena, A. Daison Raj, M. BalaAnand
 
Vol 4, No 5 (2012) Secure Key Distribution for Large and Dynamic Multicast Groups Abstract
G. Murali, G. Gurivi Reddy, Y. Srinivasulu, N. Priyanka
 
Vol 4, No 12 (2012) Secure Keying in Peer Network using Secret Sharing Technique Abstract
Y. M. Rajashri, D. K. Nayana
 
Vol 7, No 6 (2015) Secured Personal Health Record in Cloud using Attribute based Encryption Abstract
S. Vijayalakshmi, S. Geetha
 
Vol 12, No 2 (2020) Secured Source Location Privacy using Infrastructure Centric Method Abstract
D. Sindhu, A. Tamilarasan, M. Santhosh, D. Ragavi, M. Divyanand
 
Vol 8, No 5 (2016) Securing Smart Grid Communication against False Data Injection Attacks Abstract
A. Anandhi, Dr. G. Kalpana
 
Vol 8, No 6 (2016) Security against Jamming in Opportunistic Localization for Underwater Sensor Networks Abstract
Dr. P. Vijayalakshmi, S.B. Saritha
 
Vol 5, No 2 (2013) Security Analysis of Secure Routing Protocols over MANET Abstract
Pradnya R. Patange, S. P. Medhane
 
Vol 6, No 2 (2014) Security and Trust Based Model for Peer To Peer System Abstract
S. Saranya
 
Vol 4, No 1 (2012) Security Aspects in Wireless Sensor Network Abstract
Pratibhadevi Tapashetti, A. S. Umesh, Ashalatha Kulshrestha
 
Vol 8, No 6 (2016) Security Enhancement in WDM PON by Using Broadband Light Source (BLS) Abstract
Khushboo Arora, Himali Sarangal
 
Vol 7, No 5 (2015) Security Framework for Single Sign-On in Cloud Abstract
Punit J. Teraiya
 
Vol 2, No 5 (2010) Security in Mobile Communication Using Digital Signature with WAP Abstract
D. Revathi, K. Ravikumar
 
751 - 775 of 900 Items First Previous 26 27 28 29 30 31 32 33 34 35 Next Last