Vol 4, No 6 (2012)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Study and Analysis of a New Data Encryption Technique Using Special Symbols Shifting PDF
Sayani Manna, Satarupa Chatterjee, Tuhina Koley, Monali Mukherjee, Sanjay Chakraborty 311-315
A High Throughput Pattern Matching Using Byte Filtered Bit_Split Algorithm PDF
C.R. Rathish, P. Devasundar 316-319
Enhancement of Video Streaming Quality in Lossy Wireless Mesh Network PDF
D. Ramesh, D. Ayya Muthukumar 320-323
Cloud Computing: A Next Generation Revolution in IT with e-Governance PDF
Vivek Tiwari, Umesh Bindal, Shailesh Pandey 324-330
New Data Encryption Standard Algorithm PDF
C.V. Anchugam 331-336
Fuzzy-Ant Based Dynamic Routing on Large Road Networks PDF
M. Geetha, Dr.G.M. Kadhar Nawaz 337-342
Managing Trust and Detecting the Guilty Party in P2P Networks PDF
G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar 343-346
Entropy Variation Based Detecting DDoS Attack in Large Scale Networks PDF
M. Uthaya Kumar, B. Aysha Banu 347-355
Ensuring Security and Dynamic Operation Support for Storage Services in Cloud Computing PDF
V.K. Deepa, S. Jothichellammal 356-359


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616