Table of Contents
Articles
| Cluster-Based License Revocation with Vindication Ability for Mobile Ad Hoc Networks |
PDF
|
| S. Jagadeesan | 173-179 |
| Mobile Phone Cloning and Computing |
PDF
|
| M. Monisha, S. Sivachandiran | 180-184 |
| Key Management Schemes in Wireless Sensor Networks: A Survey |
PDF
|
| R Vijaya Saraswathi, L Padma Sree, K. Anuradha | 185-190 |
| Performance Evaluation of Wireless Mesh Network (IEEE 802.11s) |
PDF
|
| Shallu Singh, Kiran Ahuja | 191-195 |
| LERMP: A Secure Location Based Efficient Multipath Routing Protocol |
PDF
|
| Rajan Gandhi, Dr. Prasanna Joeg | 196-201 |
| Secure and Scalable Sensor Data Access Network with Delay Tolerance |
PDF
|
| P. Saranya, Dr. R. S. Ponmagal | 202-206 |
| Isolation of Malevolent Nodes using Supportive Trap in Mobile Adhoc Networks |
PDF
|
| C. Sangami, T.V. Ananthan, S. Shruthi | 207-210 |
| Securing Smart Grid Communication against False Data Injection Attacks |
PDF
|
| A. Anandhi, Dr. G. Kalpana | 211-215 |
| Key Metrics for Safeguarding Confidential Data in Cloud |
PDF
|
| L. Karthikeyan, G. Sreeram | 216-218 |
| Virtual Localization of Mobile Robot in Simulink and Hardware Interfacing |
PDF
|
| M.C. Harish Bharath, G. Kalaiarassan | 219-225 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640