Issue | Title | |
Vol 4, No 3 (2012) | Role of Fuzzy Logic in Information Routing - A Review | Abstract |
Paramjit Singh, Ajay k. Sharma, T.S. Kamal | ||
Vol 3, No 12 (2011) | Role of Smart Phones in Cloud Computing | Abstract |
N. Prasanna Balaji, U. Sreenivasulu, A.B. Ramesh | ||
Vol 2, No 2 (2010) | Role-Based Access Control Architecture in Grid Environments | Abstract |
M. Nithya, R.S.D. Wahida Banu | ||
Vol 2, No 3 (2010) | Routing and Wavelength Assignment Schemes in WDM Optical Networks | Abstract |
K. Aparna, Dr. S. Venkatachalam, Dr. G.R. Babu | ||
Vol 3, No 1 (2011) | Routing in Automatically Switched Optical Networks Using Hop Routing Algorithm | Abstract |
S. Indira Gandhi, V. Vaidehi, Xavier Fernando | ||
Vol 2, No 3 (2010) | RWA in the Presence of Wavelength Conversion in WDM Networks | Abstract |
S. Suryanarayana, Dr.K. Ravindra, Dr.K. Chenna Kesava Reddy | ||
Vol 3, No 2 (2011) | SAMON - C: Sensor Access and Monitoring in Cloud Environment | Abstract |
R.S. Ponmagal, Dr.J. Raja | ||
Vol 5, No 2 (2013) | Scalability Issues and Research Challenges in Cloud Computing | Abstract |
L. Arockiam, A. Stanislas | ||
Vol 1, No 3 (2009) | Scalable Contributory Key Agreement with Efficient Authentication | Abstract |
Dr. M. Rajaram, D. Thilagavathy | ||
Vol 2, No 7 (2010) | Scalable Energy Efficient Ad-Hoc on Demand Distance Vector Routing Protocol | Abstract |
Mandhir Kaur, Jasbir Singh Saini, Prabhneet Kaur | ||
Vol 3, No 4 (2011) | Scheduling in Computational Grid Using Improved Ant Colony Optimization Algorithm | Abstract |
L.M. Nithya, Dr.A. Shanmugam, J. Rajeshkumar | ||
Vol 8, No 10 (2016) | Scheduling in Networked Control System for Monitoring and Protection Applications in Sensor Nodes | Abstract |
Dr. M. Sundar Rajan | ||
Vol 5, No 3 (2013) | Secure and Efficient RFID Authentication for Social Network in Cloud | Abstract |
Sherin Jobe, G. Venifa Mini, J.Jeya A.Celin | ||
Vol 6, No 7 (2014) | Secure Auditing Method for Cloud Computing | Abstract |
S. Srinivasan, K. Raja | ||
Vol 8, No 3 (2016) | Secure Authorized Deduplication in Hybrid Cloud with Public Auditing | Abstract |
J. Dhivya, R. Santhosh | ||
Vol 7, No 4 (2015) | Secure Communication for Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption Technique | Abstract |
A. Balakumar, R. Senthilkumar | ||
Vol 7, No 8 (2015) | Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System | Abstract |
Dipti Balasaheb Bansode, Amar Buchade | ||
Vol 10, No 4 (2018) | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks | Abstract |
G. Swathika, R. Vijayalakshmi | ||
Vol 10, No 8 (2018) | Secure Data Sharing in Cloud Computing using RS-IBE | Abstract |
T. Amith Kumar | ||
Vol 2, No 6 (2010) | Secure Data Transmission in Wireless Sensor Network using Randomized Multipath Routes | Abstract |
K. Soundar Rajan | ||
Vol 4, No 7 (2012) | Secure Low Cost FPGA-based AMI System using LTE Technology | Abstract |
M.M. Abutaleb, A.M. Allam | ||
Vol 2, No 5 (2010) | Secure Multi Server Strong-Password Authentication Using Two Factor Approach (Image Password and Mobile) | Abstract |
R. KanakasundaraRao | ||
Vol 3, No 11 (2011) | Secure Multicast Routing Protocol against Insider Attacks in MANET | Abstract |
V. Jayalakshmi, Dr. R. Rameshkumar | ||
Vol 8, No 5 (2016) | Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage | Abstract |
S. Nalini Poornima, Dr. R. S. Ponmagal | ||
Vol 6, No 2 (2014) | Secure Probabilistic Location Verification for Wireless Sensor Networks | Abstract |
R. VidhyaLakshmi, G. Surya | ||
801 - 825 of 963 Items | << < 28 29 30 31 32 33 34 35 36 37 > >> |
ISSN: 0974 – 9616