Vol 8, No 5 (2016)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Cluster-Based License Revocation with Vindication Ability for Mobile Ad Hoc Networks PDF
S. Jagadeesan 173-179
Mobile Phone Cloning and Computing PDF
M. Monisha, S. Sivachandiran 180-184
Key Management Schemes in Wireless Sensor Networks: A Survey PDF
R Vijaya Saraswathi, L Padma Sree, K. Anuradha 185-190
Performance Evaluation of Wireless Mesh Network (IEEE 802.11s) PDF
Shallu Singh, Kiran Ahuja 191-195
LERMP: A Secure Location Based Efficient Multipath Routing Protocol PDF
Rajan Gandhi, Dr. Prasanna Joeg 196-201
Secure and Scalable Sensor Data Access Network with Delay Tolerance PDF
P. Saranya, Dr. R. S. Ponmagal 202-206
Isolation of Malevolent Nodes using Supportive Trap in Mobile Adhoc Networks PDF
C. Sangami, T.V. Ananthan, S. Shruthi 207-210
Securing Smart Grid Communication against False Data Injection Attacks PDF
A. Anandhi, Dr. G. Kalpana 211-215
Key Metrics for Safeguarding Confidential Data in Cloud PDF
L. Karthikeyan, G. Sreeram 216-218
Virtual Localization of Mobile Robot in Simulink and Hardware Interfacing PDF
M.C. Harish Bharath, G. Kalaiarassan 219-225


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9640