Vol 4, No 1 (2012)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Detecting and Isolating Malicious Packet Losses PDF
K. Balasubramanian, R. Anandraj 1-3
Traffic Facet Psychoanalysis through Cryptography for an Attack PDF
B. Muthulakshmi 4-7
Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor PDF
B. Muthukumar, S. Jeevananthan 8-15
Monitoring and Control System for Precision Farming using WSN PDF
Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka Priyanka, Komal Komal 16-21
VLSI Implementation of Data Security Architecture PDF
Dilip Thomas, K. S. M. Panicker 22-29
A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks PDF
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran 30-35
Real-Time Wireless Sensor Network for Temperature Monitoring PDF
Swati Mahabole, Dr. Sanjay Patil 36-38


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616