Design and Develop an Approach for Integrating Compression and Encryption on Textual Data |
Amit Jain, Avinash Panwar, Divya Bhatnagar |
Vol 2, No 3 (2015), Pagination: 124-134
|
ABSTRACT |
PDF
|
|
Abstract Views: 251 |
PDF Views: 3
|
Design and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard |
Sercan Vancin, Ebubekir Erdem |
Vol 2, No 3 (2015), Pagination: 135-143
|
ABSTRACT |
PDF
|
|
Abstract Views: 253 |
PDF Views: 2
|
Task scheduling in Cloud Using Hybrid Cuckoo Algorithm |
Sumandeep Aujla, Amandeep Ummat |
Vol 2, No 3 (2015), Pagination: 144-150
|
ABSTRACT |
PDF
|
|
Abstract Views: 245 |
PDF Views: 1
|
Improved Signcryption Algorithm for Information Security in Networks |
R. Bhagavath Nishanth, B. Ramakrishnan, M. Selvi |
Vol 2, No 3 (2015), Pagination: 151-157
|
ABSTRACT |
PDF
|
|
Abstract Views: 252 |
PDF Views: 1
|