Table of Contents
Vol 1, No 5 (2010)
Articles
Customized PKI for SCADA System | ||
Anupam Saxena, Om Pal, Zia Saquib, Dhiren Patel | ||
Vol 1, No 5 (2010), Pagination: 282-289 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 255 | PDF Views: 0 |
Design and Modeling Billing Solution to Next Generation Networks | ||
Kamaljit I. Lakhtaria, N. N. Jani | ||
Vol 1, No 5 (2010), Pagination: 290-294 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 276 | PDF Views: 0 |
Design and Implementation of a Two Level Scheduler for HADOOP Data Grids | ||
G. Sudha Sadhasivam, M. Anjali | ||
Vol 1, No 5 (2010), Pagination: 295-300 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 256 | PDF Views: 0 |
Fuzzy Based Approach for Packet Dropping in Wireless Networks | ||
J. D. Mallapur, S. S. Manvi, D. H. Rao | ||
Vol 1, No 5 (2010), Pagination: 301-306 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 273 | PDF Views: 0 |
Virtual Market Using Logistics Optimization | ||
Reddy Veera Babu, M. Venkata Rao | ||
Vol 1, No 5 (2010), Pagination: 307-313 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 231 | PDF Views: 0 |
Performance Analysis of Internal vs. External Security Mechanism in Web Applications | ||
Supriya Gupta, Lalitsen Sharma | ||
Vol 1, No 5 (2010), Pagination: 314-317 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 242 | PDF Views: 0 |
Perceptual Metrics Watermarking-An Effective Algorithm with Retrieval Systems | ||
Rekha B. Venkatapur, V. D. Mytri, A. Damodaram | ||
Vol 1, No 5 (2010), Pagination: 318-322 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 259 | PDF Views: 0 |
A Montgomery Representation of Elements in GF(25) for Efficient Arithmetic to Use in Elliptic Curve Cryptography | ||
A. R. Rishivarman, B. Parthasarathy, M. Thiagarajan | ||
Vol 1, No 5 (2010), Pagination: 323-326 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 329 | PDF Views: 0 |
A Secure Key Agreement Protocol Using Braid Groups | ||
Atul Chaturvedi, Shyam Sundar | ||
Vol 1, No 5 (2010), Pagination: 327-330 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 301 | PDF Views: 0 |
Performance Modeling in Client Server Network Comparison of Hub, Switch and Bluetooth Technology Using Markov Algorithm and Queuing Petri Nets with the Security of Steganography | ||
V. B. Kirubanand, S. Palaniammal | ||
Vol 1, No 5 (2010), Pagination: 331-336 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 247 | PDF Views: 0 |
Design and Analysis of a 2D-Photonic Crystal Fiber Structure with Ultra-Flattened Dispersion and Single Mode Operation Over a Wide Range of Wavelength | ||
Sandhir K. Singh, Dharmendra K. Singh, P. Mahto | ||
Vol 1, No 5 (2010), Pagination: 337-340 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 274 | PDF Views: 0 |