Vol 3, No 6 (2011)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Virtual Password Obscuring in Avoidance of Keyloggers PDF
J. Jeysree 371-374
Improving the Performance of Interactive TCP Applications using End-Point Techniques PDF
Varun G. Menon, Alfred Raja Melvin 375-379
A New Protocol Stack for 6LoWPAN – An Overview PDF
R.B. Jagadeesha 380-389
LIGHTMQ Provider for Java Message Service PDF
Sushila Aghav, Shailesh Deshpande, Prajyot Jadhav 390-395
Workflow Based Resource Allocation and Monitoring Using Mobile Agents PDF
L. Venkatakrishnan, T.V.U. Kiran Kumar, M.A. Dorairengaswamy 396-400
Gaze-based Password Entry Systems PDF
S. Yamini 401-403
A Survey of Peer To Peer Network PDF
R. Maruthaveni, S. kalaivani 404-407
Improved Cyber Security by Hardware Acceleration of Scalable Encryption Algorithm in OpenSSL PDF
A. Thiruneelakandan, N. Hemavathy 408-414
An Efficient Reliable Protocol in AD-Hoc Network Using A Cross Layer Approach via TCP PDF
R. Thamizhamuthu, G. Ilanchezhia Pandian, Dr.P. Sheik Abdul Khader 415-417
Automatic River Pollutant Monitoring & Flood Detection Using Sensor Web PDF
G. Srinivasan, L. Prabahar, B. Muthukrishnavinayagam 418-423
Adaptive Routing for QoS in Manet by Using Cross Layer Architecture PDF
P. Chitra, G. Ilanchezhia Pandian, Dr.P. Sheik Abdul Khader 424-426
Privacy Protected Query Processing using Advanced Location Based Service PDF
U. Nithyapriya, M. Kalimuthu 427-432
An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms PDF
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo 433-435
A Quarantine Model for Malicious Objects in Computer Network PDF
Aditya Kumar Singh, Bimal Kumar Mishra 436-440
A Distributed Time Delay Model of Worms in Computer Network PDF
Samir Kumar Pandey, Bimal Kumar Mishra, Prasanna Kumar Satpathy 441-447


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616