| Issue | Title | |
| Vol 10, No 4 (2018) | Review of Viterbi Decoder and Its Adequacy in Digital Communication | Abstract |
| Atul Deep Soni, Sunil Malviya, Dr. Neelesh Gupta | ||
| Vol 7, No 5 (2015) | Revival of Node Failure in Wireless Sensor Networks Using E3D Algorithm | Abstract |
| K. Ganapathi, R. Kalaivani Sri | ||
| Vol 2, No 10 (2010) | Ring Resonator Based Compact Bandpass Filters for UWB Applications | Abstract |
| K. Thirumalaivasan, R. Nakkeeran | ||
| Vol 7, No 6 (2015) | Risk Conscious Easing of Routing Attacks for Ad-hoc Networks | Abstract |
| C. Dhanasekaran, Dr. R.S. Ponmagal | ||
| Vol 5, No 7 (2013) | Robust Location Aware Wormhole Detection Technique for Wireless Sensor Network | Abstract |
| Ajay Jangra, Bhavana . | ||
| Vol 2, No 10 (2010) | Role of Multi Agents in Wireless Sensor Network for Event Detection | Abstract |
| G. Sundari, P.E. Sankaranarayanan | ||
| Vol 2, No 9 (2010) | Role of Probabilistic Packet Marking Mechanism in Large Scale IP Trace Backs | Abstract |
| K. Venkatesh Sharma, A.Lakshmi kanth, M. Dheeraj | ||
| Vol 3, No 6 (2011) | Route Maintenance in Dynamic Source Routing Using Link Breakage Prediction Algorithm for Mobile Ad-hoc Networks | Abstract |
| S. Rajeswari, J. Janet | ||
| Vol 3, No 14 (2011) | Routing - An Ultimate Optimization in Mobile Adhoc Network | Abstract |
| K.M. Mohamed Sudheer, Dr.K.R. Shankar Kumar | ||
| Vol 3, No 11 (2011) | Routing Protocols for Ad Hoc Mobile Wireless Networks: A Comparative Study | Abstract |
| Vishnu Kumar Sharma, Dr. Sarita Singh Bhadauria | ||
| Vol 5, No 6 (2013) | Rural Development via Communication (Wire Architecture) | Abstract |
| R. Maheswari, Dr.T.V.U. Kirankumar, S. Kannappan | ||
| Vol 4, No 8 (2012) | Saving Energy in Mobile Devices with WLAN and Bluetooth Interfaces using Cooperative Clustering Network | Abstract |
| B. RasinaBegum, R. Karthikeyan | ||
| Vol 6, No 7 (2014) | Secure and Robust Localization in Wireless Network Protection | Abstract |
| S. Jagadeesan | ||
| Vol 8, No 5 (2016) | Secure and Scalable Sensor Data Access Network with Delay Tolerance | Abstract |
| P. Saranya, Dr. R. S. Ponmagal | ||
| Vol 7, No 4 (2015) | Secure Data Share In Drop Box Using Key-Aggregate Cryptosystem | Abstract |
| E. Elamathi, Dr. ArokyRaju, K. Ravikumar | ||
| Vol 7, No 3 (2015) | Secure Data Storage in Cloud with Decentralized Access Control Scheme and Anonymous Authentication | Abstract |
| S. RamaLakshmi, V. Suganya, B. Saranya, V. Srinivasan | ||
| Vol 4, No 12 (2012) | Secure Data Transmission in Wireless Sensor Networks using Randomized Dispersive Paths | Abstract |
| Dhirajkumar Shelke, Pushkar Sathe, Omkar Sabane, Vinod Sawant | ||
| Vol 5, No 11 (2013) | Secure Data Transmission Using Cloud Computing | Abstract |
| Trinath Naralasetty, K. Eswar | ||
| Vol 7, No 7 (2015) | Secure Deduplication with Reliable Convergent Key Management in Hybrid Cloud | Abstract |
| M. Gomathi Pradeepa, S. Geetha | ||
| Vol 8, No 3 (2016) | Secure Group Sharing in Dynamic Public Cloud Environment | Abstract |
| R. Santhosh, M. Veeramanikandan | ||
| Vol 7, No 7 (2015) | Secure Image Steganography Combined with DES Encryption | Abstract |
| K. Veeramanikandan, P. Manjamadevi, K. Latha | ||
| Vol 6, No 9 (2014) | Secure Information Distribution in Cloud Computing | Abstract |
| C. Leena, A. Daison Raj, M. BalaAnand | ||
| Vol 4, No 5 (2012) | Secure Key Distribution for Large and Dynamic Multicast Groups | Abstract |
| G. Murali, G. Gurivi Reddy, Y. Srinivasulu, N. Priyanka | ||
| Vol 4, No 12 (2012) | Secure Keying in Peer Network using Secret Sharing Technique | Abstract |
| Y.M. Rajashri, D.K. Nayana | ||
| Vol 10, No 2 (2018) | Secure Routing in Wireless Ad-hoc Network using ARD Mechanism and Elliptic Curve Routing Algorithm | Abstract |
| C. Chandra Prabha, Dr. S. Krishnaveni | ||
| 776 - 800 of 945 Items | << < 27 28 29 30 31 32 33 34 35 36 > >> | |
ISSN: 0974 – 9640