Vol 8, No 5 (2016)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

A Secure - Acknowledgment Based Detection Approach for MANET’S PDF
V. Sathya 153-162
A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs PDF
K. Gayathri, S. Sivachandiran 163-167
Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique PDF
M. Sudha, Neelima Jhavar 168-172
Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network PDF
P. Jenis, P.K. Poonguzhali, M. Jeeva Jebakani 173-175
Security Using RSA Algorithm in Opportunistic Localization for Underwater Sensor Networks PDF
Dr.P. Vijayalakshmi, S.B. Saritha 176-179
A Study on Authentication Challenges & Approaches PDF
C. Subramanian, S. Stephen raj 180-182
Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography PDF
K. Saranya, P. Kavitha 183-186
Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network PDF
T.K. Ujina, Dr. Sai Shanmuga Raja 187-191
A Study on Innovative Testing Techniques PDF
S. Somasundaram 192-194
Semi Trusted Third Party Using Dynamic Grid System for Location Based Services PDF
Rupa Debnath, G. Senthil Velan 195-199
Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage PDF
S. Nalini Poornima, Dr. R. S. Ponmagal 200-204


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616