Customized PKI for SCADA System |
Anupam Saxena, Om Pal, Zia Saquib, Dhiren Patel |
Vol 1, No 5 (2010), Pagination: 282-289
|
ABSTRACT |
PDF
|
|
Abstract Views: 150 |
PDF Views: 0
|
Design and Modeling Billing Solution to Next Generation Networks |
Kamaljit I. Lakhtaria, N. N. Jani |
Vol 1, No 5 (2010), Pagination: 290-294
|
ABSTRACT |
PDF
|
|
Abstract Views: 175 |
PDF Views: 0
|
Design and Implementation of a Two Level Scheduler for HADOOP Data Grids |
G. Sudha Sadhasivam, M. Anjali |
Vol 1, No 5 (2010), Pagination: 295-300
|
ABSTRACT |
PDF
|
|
Abstract Views: 161 |
PDF Views: 0
|
Fuzzy Based Approach for Packet Dropping in Wireless Networks |
J. D. Mallapur, S. S. Manvi, D. H. Rao |
Vol 1, No 5 (2010), Pagination: 301-306
|
ABSTRACT |
PDF
|
|
Abstract Views: 165 |
PDF Views: 0
|
Virtual Market Using Logistics Optimization |
Reddy Veera Babu, M. Venkata Rao |
Vol 1, No 5 (2010), Pagination: 307-313
|
ABSTRACT |
PDF
|
|
Abstract Views: 151 |
PDF Views: 0
|
Performance Analysis of Internal vs. External Security Mechanism in Web Applications |
Supriya Gupta, Lalitsen Sharma |
Vol 1, No 5 (2010), Pagination: 314-317
|
ABSTRACT |
PDF
|
|
Abstract Views: 156 |
PDF Views: 0
|
Perceptual Metrics Watermarking-An Effective Algorithm with Retrieval Systems |
Rekha B. Venkatapur, V. D. Mytri, A. Damodaram |
Vol 1, No 5 (2010), Pagination: 318-322
|
ABSTRACT |
PDF
|
|
Abstract Views: 165 |
PDF Views: 0
|
A Montgomery Representation of Elements in GF(25) for Efficient Arithmetic to Use in Elliptic Curve Cryptography |
A. R. Rishivarman, B. Parthasarathy, M. Thiagarajan |
Vol 1, No 5 (2010), Pagination: 323-326
|
ABSTRACT |
PDF
|
|
Abstract Views: 226 |
PDF Views: 0
|
A Secure Key Agreement Protocol Using Braid Groups |
Atul Chaturvedi, Shyam Sundar |
Vol 1, No 5 (2010), Pagination: 327-330
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 0
|