Issue | Title | |
Vol 3, No 11 (2011) | Routing Protocols for Ad Hoc Mobile Wireless Networks:A Comparative Study | Abstract |
Vishnu Kumar Sharma, Sarita Singh Bhadauria | ||
Vol 5, No 6 (2013) | Rural Development via Communication (Wire Architecture) | Abstract |
R. Maheswari, T. V. U. Kirankumar, S. Kannappan | ||
Vol 4, No 8 (2012) | Saving Energy in Mobile Devices with WLAN and Bluetooth Interfaces using Cooperative Clustering Network | Abstract |
B. RasinaBegum, R. Karthikeyan | ||
Vol 6, No 7 (2014) | Secure and Robust Localization in Wireless Network Protection | Abstract |
S. Jagadeesan | ||
Vol 8, No 5 (2016) | Secure and Scalable Sensor Data Access Network with Delay Tolerance | Abstract |
P. Saranya, Dr. R. S. Ponmagal | ||
Vol 7, No 4 (2015) | Secure Data Share in Drop Box Using Key-Aggregate Cryptosystem | Abstract |
E. Elamathi, Aroky Raju, K. Ravikumar | ||
Vol 7, No 3 (2015) | Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication | Abstract |
S. RamaLakshmi, V. Suganya, B. Saranya, V. Srinivasan | ||
Vol 4, No 12 (2012) | Secure Data Transmission in Wireless Sensor Networks using Randomized Dispersive Paths | Abstract |
Dhirajkumar Shelke, Pushkar Sathe, Omkar Sabane, Vinod Sawant | ||
Vol 5, No 11 (2013) | Secure Data Transmission Using Cloud Computing | Abstract |
Trinath Naralasetty, K. Eswar | ||
Vol 7, No 7 (2015) | Secure Deduplication with Reliable Convergent Key Management in Hybrid Cloud | Abstract |
M. Gomathi Pradeepa, S. Geetha | ||
Vol 8, No 3 (2016) | Secure Group Sharing in Dynamic Public Cloud Environment | Abstract |
R. Santhosh, M. Veeramanikandan | ||
Vol 7, No 7 (2015) | Secure Image Steganography Combined with DES Encryption | Abstract |
K. Veeramanikandan, P. Manjamadevi, K. Latha | ||
Vol 6, No 9 (2014) | Secure Information Distribution in Cloud Computing | Abstract |
C. Leena, A. Daison Raj, M. BalaAnandď€ | ||
Vol 4, No 5 (2012) | Secure Key Distribution for Large and Dynamic Multicast Groups | Abstract |
G. Murali, G. Gurivi Reddy, Y. Srinivasulu, N. Priyanka | ||
Vol 4, No 12 (2012) | Secure Keying in Peer Network using Secret Sharing Technique | Abstract |
Y. M. Rajashri, D. K. Nayana | ||
Vol 7, No 6 (2015) | Secured Personal Health Record in Cloud using Attribute based Encryption | Abstract |
S. Vijayalakshmi, S. Geetha | ||
Vol 12, No 2 (2020) | Secured Source Location Privacy using Infrastructure Centric Method | Abstract |
D. Sindhu, A. Tamilarasan, M. Santhosh, D. Ragavi, M. Divyanand | ||
Vol 8, No 5 (2016) | Securing Smart Grid Communication against False Data Injection Attacks | Abstract |
A. Anandhi, Dr. G. Kalpana | ||
Vol 8, No 6 (2016) | Security against Jamming in Opportunistic Localization for Underwater Sensor Networks | Abstract |
Dr. P. Vijayalakshmi, S.B. Saritha | ||
Vol 5, No 2 (2013) | Security Analysis of Secure Routing Protocols over MANET | Abstract |
Pradnya R. Patange, S. P. Medhane | ||
Vol 6, No 2 (2014) | Security and Trust Based Model for Peer To Peer System | Abstract |
S. Saranya | ||
Vol 4, No 1 (2012) | Security Aspects in Wireless Sensor Network | Abstract |
Pratibhadevi Tapashetti, A. S. Umesh, Ashalatha Kulshrestha | ||
Vol 8, No 6 (2016) | Security Enhancement in WDM PON by Using Broadband Light Source (BLS) | Abstract |
Khushboo Arora, Himali Sarangal | ||
Vol 7, No 5 (2015) | Security Framework for Single Sign-On in Cloud | Abstract |
Punit J. Teraiya | ||
Vol 2, No 5 (2010) | Security in Mobile Communication Using Digital Signature with WAP | Abstract |
D. Revathi, K. Ravikumar | ||
751 - 775 of 900 Items | First Previous 26 27 28 29 30 31 32 33 34 35 Next Last |
Browse Title Index
Scroll