A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks |
Muhammad Sharif, Aisha Azeem, Mudassar Raza, Waqas Haider |
Vol 3, No 5 (2012), Pagination: 1298-1301
|
ABSTRACT |
PDF
|
|
Abstract Views: 169 |
PDF Views: 0
|
Efficient Data Reporting Protocol for Wireless Sensor Networks |
Siddhartha Chauhan, Lalit Kumar Awasthi |
Vol 3, No 5 (2012), Pagination: 1302-1310
|
ABSTRACT |
PDF
|
|
Abstract Views: 177 |
PDF Views: 0
|
Energy Aware Node Selection for Cluster-Based Data Accuracy Estimation in Wireless Sensor Networks |
Jyotirmoy Karjee, H. S. Jamadagni |
Vol 3, No 5 (2012), Pagination: 1311-1322
|
ABSTRACT |
PDF
|
|
Abstract Views: 172 |
PDF Views: 0
|
Optimal Routing in Ad-Hoc Network Using Genetic Algorithm |
Anjum A. Mohammed, Gihan Nagib |
Vol 3, No 5 (2012), Pagination: 1323-1328
|
ABSTRACT |
PDF
|
|
Abstract Views: 178 |
PDF Views: 0
|
Elliptic Curve Point Multiplication Using MBNR and Point Halving |
G. N. Purohit, Asmita Singh Rawat, Manoj Kumar |
Vol 3, No 5 (2012), Pagination: 1329-1337
|
ABSTRACT |
PDF
|
|
Abstract Views: 195 |
PDF Views: 0
|
A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques |
Harshavardhan Kayarkar |
Vol 3, No 5 (2012), Pagination: 1338-1351
|
ABSTRACT |
PDF
|
|
Abstract Views: 166 |
PDF Views: 0
|
Comparative Analysis of Routing Attacks in Ad Hoc Network |
Bipul Syam Purkayastha, Rajib Das |
Vol 3, No 5 (2012), Pagination: 1352-1357
|
ABSTRACT |
PDF
|
|
Abstract Views: 173 |
PDF Views: 0
|
Counter Measures to Combat Misuses of MAC Address Spoofing Techniques |
Alok Pandey, Jatinderkumar R. Saini |
Vol 3, No 5 (2012), Pagination: 1358-1361
|
ABSTRACT |
PDF
|
|
Abstract Views: 206 |
PDF Views: 0
|
An effective Method for Attack RSA Strategy |
Vibhor Mehrotra, Prakash Singh Rana |
Vol 3, No 5 (2012), Pagination: 1362-1366
|
ABSTRACT |
PDF
|
|
Abstract Views: 171 |
PDF Views: 0
|
Algorithms to Improve Resource Utilization and Request Acceptance Rate in IaaS Cloud Scheduling |
Vivek Shrivastava, D. S. Bhilare |
Vol 3, No 5 (2012), Pagination: 1367-1374
|
ABSTRACT |
PDF
|
|
Abstract Views: 164 |
PDF Views: 0
|
Multiband Vivaldi Antenna for X and Ku Band Applications |
N. Durga Indira, B. T. P. Madhav, K. Balaji, B. Rajagopalarao, K. Venkata Kishore |
Vol 3, No 5 (2012), Pagination: 1375-1378
|
ABSTRACT |
PDF
|
|
Abstract Views: 198 |
PDF Views: 0
|
A Review of Color Visual Cryptographic Schemes |
Richa K. Makhijani, Lavina D. Panjwani |
Vol 3, No 5 (2012), Pagination: 1379-1384
|
ABSTRACT |
PDF
|
|
Abstract Views: 181 |
PDF Views: 0
|