Vol 4, No 9 (2012)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents

Articles

Risk-Based Kerberised Service with JINI in Pervasive Environment PDF
M. Kavitha, D. Prakash 525-529
Improved Cryptography for Avoiding Data Frauds on Mobile Devices PDF
A. Sharmishta Desai 530-533
The Design of a Group Communication System for Distributed and Complex Systems PDF
F. Lassoued, R. Bouallegue 534-540
Blocking the Misbehaving Access using Ticket Based Method in Anonymous Networks PDF
C. Jackulin, D. Elavarasi, Vivian Rachel Jayson 541-547
Distributed System Architecture for Grid Resource Monitoring and Resource State Prediction PDF
S. Sabeetha Saraswathi, S. Mohana, N. Vijayaraj, S. Imavathy, S. Mahalakshmi 548-551
Mobile Communication: SMS Security Review (Issues, Attacks and Preventive Measures) PDF
Gurjeet Kaur, Monika Sachdeva, Dr.K.K. Saluja 552-559
A Study on Pros and Cons of the Cloud Computing PDF
J. Vanitha, C. Mallika, A. Hema, K. Durga, S. Visalatchy 560-563
Multi Factor Authentication using Steganography and One Time Password PDF
S. Arun Kumar, S. Vijayakumari, B.Dharani Chander 564-567
A Framework for Dynamic Multipath Self Reconfiguration Mechanism in Wireless Mesh Network PDF
R. Lakshmipriya, S. Rajasoundaran, S. Janakiraman 568-572
Ultra High Tech Multi-Pipelining String Matching for Deep Packet Inspection PDF
N. Kannaiya Raja, Dr.K. Arulanandam, R. Prabhu 573-583
Improving Network Lifetime using Mobile Element PDF
C. Jeyaram, Anitha Julian 584-587


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616