Vol 5, No 8 (2013)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Fault Forbearance Methods for Randomized Intrusion Tolerance PDF
R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi 379-382
Analysis and Implementation of Optimized Image Encryption Algorithm using Bhramgupta-Bhaskara Equation PDF
Sanjay Chaudhari, Dr. Deepak Dembla 383-388
Implementation of EESCP Protocol in Mobile Adhoc Networks PDF
P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan 389-394
Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity PDF
G. Sankareeswari, C. Jeganathan 395-401
Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility PDF
Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari 402-406
Dynamic Job and Resource Grouping-based Scheduling in Grid Computing PDF
P. Ashok 407-411
Methods of Reducing False Alerts by Intrusion Detection System PDF
PrajaktaSandeep Jadhav 412-416


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616