Browse Title Index


 
Issue Title
 
Vol 3, No 3 (2011) Middleware Architectural Framework for Secured Services in MANETs Abstract
T. Abdul Razak, R. Balasubramanian
 
Vol 3, No 7 (2011) Minimum Energy Consumption Channel Allocation Scheme in LR-WPAN Abstract
P. Kaushik, J. Singhai
 
Vol 2, No 9 (2010) Mitigating Denial-of-Service Attacks on the Chord Overlay Network: A Location Hiding Approach Abstract
K. Venkatesh Sharma, K. Hanumantha Rao, K. Ramu
 
Vol 5, No 3 (2013) Mitigation of Flooding attack using Defense Mechanism in Mobile Adhoc Networks Abstract
M. Muthumeenakshi, Dr. P. Subathra
 
Vol 6, No 6 (2014) Mixing Substitution and Transposition Method for Enhancing Security Abstract
Tanvi Tanvi
 
Vol 3, No 5 (2011) Mobile Agent Based Cooperative Intrusion Detection System and Minimization of Malicious Packet Losses Abstract
J. Arokia Renjit, Dr.K.L Shunmuganathan
 
Vol 4, No 9 (2012) Mobile Communication: SMS Security Review (Issues, Attacks and Preventive Measures) Abstract
Gurjeet Kaur, Monika Sachdeva, Dr.K.K. Saluja
 
Vol 9, No 1 (2017) Mobile Computing Abstract
S. Jagadesh Kumar, R. Mahesh Kumar
 
Vol 4, No 2 (2012) MODBUS–An Overview and Applications in Automation Supporting ASCII and RTU Mode Transmission Abstract
Dr.P.M. Patil, Sameer S. Nagtilak
 
Vol 4, No 15 (2012) Modeling and Simulation of EPON based Symmetric FTTH Access Network Abstract
Vishal Sharma, Amrita Tyagi
 
Vol 3, No 3 (2011) Modeling and Study of Shielding Effectiveness of Enclosure Abstract
G. Sindura, P. Salil, K. Ram Prakash
 
Vol 3, No 7 (2011) Modeling RTT Using Box-Jenkins Model Abstract
A. Jeyasekar, S.V. Kasmir Raja
 
Vol 4, No 5 (2012) Modeling, Simulation and Capacity Analysis of Spatially Correlated Channels in MIMO Systems Abstract
Prasad Rayi, D. Madhusudan, Ch. Madhusudhan
 
Vol 2, No 1 (2010) Modelling and Control of a Grid Connected Small Scale Wind Generation System Abstract
J. Divya Navamani, A. Lavanya
 
Vol 4, No 1 (2012) Monitoring and Control System for Precision Farming using WSN Abstract
Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka Priyanka, Komal Komal
 
Vol 4, No 3 (2012) Monitoring and Mitigation of Application Layer DDOS Attacks through Heuristic Methods Abstract
C. Nithyanand Niranjan, E. Pooventhan
 
Vol 6, No 6 (2014) Most Wanted Content Management Systems for Website Development Abstract
Bhumika S. Zalavadia
 
Vol 3, No 5 (2011) Motion Capture for Computer 3D Character Animation Abstract
G. Dheepa, Dr.S. Sukumaran, K. Prabha
 
Vol 6, No 9 (2014) MRESS: A Good Epoch-Oriented Course-Plotting Management Airplane for Low-Power along with Lossy Networks Abstract
H. Ambika, S. Suguna, N. Kavitha, A. Daison Raj
 
Vol 8, No 10 (2016) MTM-Multihomed Transition Mechanism Feature for Small and Medium Enterprise Network Abstract
B.I.D. Kumar, G. Vasanth
 
Vol 7, No 1 (2015) Multi Authority Ciphertext Policy Attribute Based Encryption Schemes with Constant Ciphertext Length: A Survey Abstract
Nikita Gorasia, R.R. Srikanth, Nishant Doshi
 
Vol 4, No 9 (2012) Multi Factor Authentication using Steganography and One Time Password Abstract
S. Arun Kumar, S. Vijayakumari, B.Dharani Chander
 
Vol 10, No 6 (2018) Multi Stage Secret Sharing Scheme uses Lattices based Cryptography System Abstract
N. M. Abroja, A. Afila Parveen, E. Ranjith
 
Vol 3, No 13 (2011) Multicast Multi-path Power Efficient Routing in MANET Abstract
M. Raghavendra Rao, K. Eswar, Dr.P. Harini, Syed. Azhad
 
Vol 5, No 11 (2013) Multilayer Data Security Model for Handheld Devices with Simple Encryption Technique and Hardware Software Co-Design Abstract
J.D. Ansilla Bensam, Dr. N. Vasudevan, Dr. S. Ravi
 
626 - 650 of 963 Items << < 21 22 23 24 25 26 27 28 29 30 > >> 


ISSN: 0974 – 9616