Open Access
Subscription or Fee Access
Table of Contents
Articles
Detecting and Isolating Malicious Packet Losses | |
K. Balasubramanian, R. Anandraj | 1-3 |
Traffic Facet Psychoanalysis through Cryptography for an Attack | |
B. Muthulakshmi | 4-7 |
Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor | |
B. Muthukumar, S. Jeevananthan | 8-15 |
Monitoring and Control System for Precision Farming using WSN | |
Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka Priyanka, Komal Komal | 16-21 |
VLSI Implementation of Data Security Architecture | |
Dilip Thomas, K. S. M. Panicker | 22-29 |
A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks | |
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran | 30-35 |
Real-Time Wireless Sensor Network for Temperature Monitoring | |
Swati Mahabole, Dr. Sanjay Patil | 36-38 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616