 Open Access
		Open Access 
		 Subscription or Fee Access
					Subscription or Fee Access
			Table of Contents
Articles
| Cluster-Based License Revocation with Vindication Ability for Mobile Ad Hoc Networks | PDF   | 
| S. Jagadeesan | 173-179 | 
| Mobile Phone Cloning and Computing | PDF   | 
| M. Monisha, S. Sivachandiran | 180-184 | 
| Key Management Schemes in Wireless Sensor Networks: A Survey | PDF   | 
| R Vijaya Saraswathi, L Padma Sree, K. Anuradha | 185-190 | 
| Performance Evaluation of Wireless Mesh Network (IEEE 802.11s) | PDF   | 
| Shallu Singh, Kiran Ahuja | 191-195 | 
| LERMP: A Secure Location Based Efficient Multipath Routing Protocol | PDF   | 
| Rajan Gandhi, Dr. Prasanna Joeg | 196-201 | 
| Secure and Scalable Sensor Data Access Network with Delay Tolerance | PDF   | 
| P. Saranya, Dr. R. S. Ponmagal | 202-206 | 
| Isolation of Malevolent Nodes using Supportive Trap in Mobile Adhoc Networks | PDF   | 
| C. Sangami, T.V. Ananthan, S. Shruthi | 207-210 | 
| Securing Smart Grid Communication against False Data Injection Attacks | PDF   | 
| A. Anandhi, Dr. G. Kalpana | 211-215 | 
| Key Metrics for Safeguarding Confidential Data in Cloud | PDF   | 
| L. Karthikeyan, G. Sreeram | 216-218 | 
| Virtual Localization of Mobile Robot in Simulink and Hardware Interfacing | PDF   | 
| M.C. Harish Bharath, G. Kalaiarassan | 219-225 | 
 
		
		This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640
