Browse Title Index

Issue Title
Vol 3, No 4 (2011) A Process of Delivering the Mail Message in Domain Level Authentication Framework Using Grid Computing Abstract
B. Muthukumar, P. Banumathi, V. Karthik, R. Vidhya
Vol 11, No 4 (2019) A Proposal on Novel Cloud Scheduling Using Soft Computing Techniques Abstract
B. Kanagalakshmi
Vol 8, No 3 (2016) A QOS Oriented Analysis in WIMAX Abstract
Lovepreet Kaur, Amandeep Kaur
Vol 3, No 6 (2011) A Quarantine Model for Malicious Objects in Computer Network Abstract
Aditya Kumar Singh, Bimal Kumar Mishra
Vol 4, No 11 (2012) A Reliability Model for the Task Scheduling in Distributed Systems based on Fuzzy Theory Abstract
Sagar Gulati, P.K. Yadav, K. Bhatia
Vol 7, No 1 (2015) A Review of Para-Virtualized Environment for Data Storage Management Abstract
Ketan M. Parmar, Aspriha R. Das
Vol 11, No 10 (2019) A Review on Application Perspective of IoT and Wireless Sensor Network (WSN) Abstract
K. Ashton, S. Sadik
Vol 12, No 3-5 (2020) A Review on Routing Protocols in Wireless Sensor Networks Abstract
J De Graaff, W Zijp
Vol 4, No 1 (2012) A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks Abstract
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran
Vol 12, No 11-12 (2020) A Review on Wireless Networks and it's Architectures Abstract
Ruqiang Yan, Hanghang Sun
Vol 3, No 9 (2011) A Scalable Overlay Multicast Architecture for Large-Scale Applications Abstract
N. Murali, K. Kumaran
Vol 1, No 8 (2009) A Scheduling Algorithm for Coarse Grain Applications with Spry Technique Abstract
S. V. Sudha, K. Thanushkodi
Vol 8, No 5 (2016) A Secure - Acknowledgment Based Detection Approach for MANET’S Abstract
V. Sathya
Vol 7, No 2 (2015) A Secure Authentication Method using Acknowledgment-based IDS for MANET Abstract
Dr. G. Komarasamy, G. Gowthaman
Vol 4, No 8 (2012) A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks Abstract
N. Theja, T. Jayakumari
Vol 4, No 10 (2012): Regular Issue A Secure Scheme for Denial-of-Service Attacks in Wireless Sensor Networks Abstract
K. Pandi Karthi Kanmani, E. Srie Vidhya Janani, Dr.P. Ganesh Kumar
Vol 1, No 1 (2009) A Secured Hybrid Architecture Model for Internet Banking (E-Banking) Abstract
R. Ganesan, Dr. K. Vivekanandan
Vol 3, No 15 (2011) A Short Survey on Routing Protocols in Mobile Ad-Hoc Networks Abstract
M. Sunitha, B. Babitha, J. Samatha
Vol 4, No 12 (2012) A Study about Concepts, Virtualization, Benefits and Challenges of Cloud Computing Abstract
G. Sekar, Dr.N..M. Elango
Vol 4, No 12 (2012) A Study and Design of Encryption Less Protocol using Quantum Bits for Secure Communication in Wireless Network Abstract
K. Maharajan, M. JayaLakshmi, Dr.B. Paramasivan, V. SivaKumar
Vol 10, No 5 (2018) A Study Based On Different Protocols to Enhance Security for Data Dissemination in Wireless Sensor Networks Abstract
Divya Divya, Khateeja Rukshana, Shifana Begum, Akhilraj V. Gadagkar
Vol 5, No 6 (2013) A Study of DASH7 Technology: An Overview Abstract
R.B. Jagadeesha, Jose Oliveira
Vol 11, No 10 (2019) A Study on Applications of Security Algorithms: Attention to RSA and DH Algorithms Abstract
T. W. Hong, S. G. Miller
Vol 8, No 5 (2016) A Study on Authentication Challenges & Approaches Abstract
C. Subramanian, S. Stephen raj
Vol 14, No 1 (2022) A Study on Cyber Attack in Internet of Things Abstract
Dr. S. Banumathi, R. Abisha
76 - 100 of 963 Items << < 1 2 3 4 5 6 7 8 9 10 > >> 

ISSN: 0974 – 9616