Issue | Title | |
Vol 13, No 4 (2021) | Secure Three Layer User Authentication System | Abstract |
S. Bhoomika, Siri R Kasal, K. S. Spoorthi, M. C. Keerthana, Dr. R. Kanagavalli | ||
Vol 4, No 10 (2012): Regular Issue | Secured Autonomous Key Management with Bai’s Secret Sharing Scheme | Abstract |
N.M. SaravanaKumar, Dr. T. Purusothaman | ||
Vol 7, No 6 (2015) | Secured Personal Health Record in Cloud using Attribute based Encryption | Abstract |
S. Vijayalakshmi, S. Geetha | ||
Vol 12, No 2 (2020) | Secured Source Location Privacy using Infrastructure Centric Method | Abstract |
D. Sindhu, A. Tamilarasan, M. Santhosh, D. Ragavi, M. Divyanand | ||
Vol 8, No 5 (2016) | Securing Smart Grid Communication against False Data Injection Attacks | Abstract |
A. Anandhi, Dr. G. Kalpana | ||
Vol 8, No 6 (2016) | Security against Jamming in Opportunistic Localization for Underwater Sensor Networks | Abstract |
Dr. P. Vijayalakshmi, S.B. Saritha | ||
Vol 5, No 2 (2013) | Security Analysis of Secure Routing Protocols over MANET | Abstract |
Pradnya R. Patange, S.P. Medhane | ||
Vol 6, No 2 (2014) | Security and Trust Based Model for Peer To Peer System | Abstract |
S. Saranya | ||
Vol 4, No 1 (2012) | Security Aspects in Wireless Sensor Network | Abstract |
Pratibhadevi Tapashetti, Dr. A S. Umesh, Dr. Ashalatha Kulshrestha | ||
Vol 8, No 6 (2016) | Security Enhancement in WDM PON by Using Broadband Light Source (BLS) | Abstract |
Khushboo Arora, Himali Sarangal | ||
Vol 7, No 5 (2015) | Security Framework for Single Sign-on in Cloud | Abstract |
Punit J. Teraiya | ||
Vol 2, No 5 (2010) | Security in Mobile Communication Using Digital Signature with WAP | Abstract |
D. Revathi, K. Ravikumar | ||
Vol 13, No 1 (2021) | Security in Wireless Sensor Networks: Issues and Challenges | Abstract |
A. P. Thangamuthu | ||
Vol 3, No 15 (2011) | Security Issues and Challenges in Wireless Sensor Networks | Abstract |
V. Uma Rani, E.A. Mary Anita | ||
Vol 2, No 11 (2010) | Security Issues in Mobile Communication with MIPv6: A Survey | Abstract |
J. Isac Gnanaraj, L. Arockiam | ||
Vol 5, No 7 (2013) | Security on Mobile Agent Based Communication System | Abstract |
Tarun Dhar Diwan, Jahangeer Mohiudin Lone | ||
Vol 8, No 4 (2016) | Security Related Issues in Mobile Ad Hoc Networks | Abstract |
S. Ananthalakshmi, D. Jayakumar, S. Sivachandrian | ||
Vol 4, No 3 (2012) | Selective Flooding based Improved AODV Routing Protocol in MANETs: Analysis & Implementation | Abstract |
Mahesh Kumar Yadav, Dr. Chander Kant | ||
Vol 8, No 6 (2016) | Self-Corrective Wireless Sensor Networks | Abstract |
D. Deekshitha, R. Gowri Shankar | ||
Vol 4, No 5 (2012) | Self-Reconfigurable Wireless Mesh Network | Abstract |
Biswa Ranjan Panda, A. Pandian, J. Venkata Subramanian | ||
Vol 4, No 2 (2012) | Self-Reconfigurable Wireless Mesh Networks | Abstract |
Denny Varghese, P. Kumar | ||
Vol 8, No 6 (2016) | Sensor Node Failure Detection Using Round Trip Delay and Paths in WSNs | Abstract |
T. Kannan, K. Selvakumar | ||
Vol 7, No 4 (2015) | Shared Authority Based Privacy Preserving Authentication Protocol in De-duplication Cloud Computing | Abstract |
M. Brindha, S. Swarnamugi, R.P. Shermy, B. Leebha | ||
Vol 3, No 11 (2011) | Shorten Pulse Position Modulation for Underwater Wireless Optical Communications | Abstract |
M. Saravanakumar, S. Sarala, A. Sivagami | ||
Vol 3, No 2 (2011) | Signal Processing Issues of Spectrum Sensing in Cognitive Radio | Abstract |
J. Christopher Clement, N. Sudhakar, K.C. Srihari Priya, Kishore V. Krishnan | ||
801 - 825 of 945 Items | << < 28 29 30 31 32 33 34 35 36 37 > >> |
ISSN: 0974 – 9640