Analysis of Authentication Protocols in Mobile IP |
Lalit Kumar |
Vol 11 (2014), Pagination: 1-6
|
ABSTRACT |
PDF
|
|
Abstract Views: 206 |
PDF Views: 5
|
A Survey on the Routing Protocols in Vanet |
Sanjay Bhatnagar |
Vol 11 (2014), Pagination: 7-10
|
ABSTRACT |
PDF
|
|
Abstract Views: 210 |
PDF Views: 4
|
Cutting back the Wormhole Attack in Mobile Network: A Survey |
Ramandeep Kaur, Anita, Abhilasha |
Vol 11 (2014), Pagination: 11-17
|
ABSTRACT |
PDF
|
|
Abstract Views: 200 |
PDF Views: 1
|
Network Security: Present and Future Trends |
Anand Chopra, Jaswinder Singh Walia, Lalit Kumar |
Vol 11 (2014), Pagination: 18-22
|
ABSTRACT |
PDF
|
|
Abstract Views: 202 |
PDF Views: 0
|
Juxtaposition between Cloud Computing and Grid Computing |
Gurpreet Kaur, Sanjay Bhatnagar, Deepali |
Vol 11 (2014), Pagination: 23-28
|
ABSTRACT |
PDF
|
|
Abstract Views: 276 |
PDF Views: 1
|
Optimization of Speed Protocol Using Genetic Algorithm in Wireless Sensor Network |
Gaganpreet Kaur, Abhilasha |
Vol 11 (2014), Pagination: 41-47
|
ABSTRACT |
PDF
|
|
Abstract Views: 208 |
PDF Views: 0
|
Novel Technique of Extraction of Principal Situational Factors for NSSA |
Pardeep Bhandari |
Vol 11 (2014), Pagination: 48-57
|
ABSTRACT |
PDF
|
|
Abstract Views: 210 |
PDF Views: 0
|
Tracking of Hand Movements in Gesture Recognition a Review on Techniques and Approaches |
Prerna Gupta, Garima Joshi, Maitreyee Dutta |
Vol 11 (2014), Pagination: 57-60
|
ABSTRACT |
PDF
|
|
Abstract Views: 191 |
PDF Views: 0
|
Optimization of Wireless Sensor Network Using PSO Algorithm |
Shubhdeep Kaur, Jagmeet Singh |
Vol 11 (2014), Pagination: 61-67
|
ABSTRACT |
PDF
|
|
Abstract Views: 199 |
PDF Views: 2
|
Network Authentication Encryption Protocol Based on Kerberos: A Review |
Davinderpreet Kaur, Brahmaleen Kaur |
Vol 11 (2014), Pagination: 68-72
|
ABSTRACT |
PDF
|
|
Abstract Views: 208 |
PDF Views: 0
|
Review On Various LEACH Variants |
Rupendra Ralhan, Sandeep Singh Waraich |
Vol 11 (2014), Pagination: 73-78
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 0
|
Performance Optimization in Geographical Based Routing Protocol in MANETS |
Vikas Goyal, Shaveta Rani, Paramjit Singh |
Vol 11 (2014), Pagination: 79-86
|
ABSTRACT |
PDF
|
|
Abstract Views: 177 |
PDF Views: 0
|
Analyzing Load and Delay in Wireless LAN using TTL and Fragmentation |
Jashanpreet Kaur, Vaneet Mohan, Namisha Modi |
Vol 11 (2014), Pagination: 86-90
|
ABSTRACT |
PDF
|
|
Abstract Views: 193 |
PDF Views: 0
|
Survey of various Active Attacks in MANETS |
Meena Bharti, Shaveta Rani, Paramjeet Singh |
Vol 11 (2014), Pagination: 91-95
|
ABSTRACT |
PDF
|
|
Abstract Views: 190 |
PDF Views: 0
|
LEACH Hierarchical Protocol Based on ACO and BCO |
Rishu Singla, Dinesh Kumar |
Vol 11 (2014), Pagination: 96-101
|
ABSTRACT |
PDF
|
|
Abstract Views: 177 |
PDF Views: 0
|
Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN |
Amandeep Singh, Pankush Singla, Navdeep Kaur Khiva |
Vol 11 (2014), Pagination: 101-106
|
ABSTRACT |
PDF
|
|
Abstract Views: 197 |
PDF Views: 3
|
Review of WiMax Services and Security Threats |
Vidhu Kiran Sharma, Shaveta Rani |
Vol 11 (2014), Pagination: 107-112
|
ABSTRACT |
PDF
|
|
Abstract Views: 185 |
PDF Views: 4
|
Virtual Energy Based Encryption Keying framework for WSN: A Survey |
Sukhjinder Kaur |
Vol 11 (2014), Pagination: 113-117
|
ABSTRACT |
PDF
|
|
Abstract Views: 198 |
PDF Views: 0
|
Review of Privacy Preserving Architectures in Cloud Computing |
Navdeep Kaur Khiva, Amandeep Singh, Pankush Singla |
Vol 11 (2014), Pagination: 118-126
|
ABSTRACT |
PDF
|
|
Abstract Views: 211 |
PDF Views: 6
|
Comprehensive Study and Review Various Routing Protocols in MANET |
Prabhjot Kaur, Preet Bala, Shaveta Rani |
Vol 11 (2014), Pagination: 126-131
|
ABSTRACT |
PDF
|
|
Abstract Views: 185 |
PDF Views: 0
|