Vol 3, No 1 (2011)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents


Performance Analysis of Modified EAP-AKA Protocol Based on EAP-TLS for Beyond 3G Wireless Networks PDF
R. Narmadha, Dr.S. Malarkkan 1-6
Routing in Automatically Switched Optical Networks Using Hop Routing Algorithm PDF
S. Indira Gandhi, V. Vaidehi, Xavier Fernando 7-14
Reliable Communication with Dynamic Routing Topology Inference PDF
P. Priya, K. Vani, V. Vivek, Beaulah David 15-19
Generic Modeling of Realistic Movement Pattern of Nodes in MANET PDF
G. Prema, Dr.C. Aravindan, Dr.K. Kannan, Dr.R. Maheswaran 20-25
Need for Enhanced Standards in Information Security, Cryptography PDF
K. Anupama 26-30
An Overview of Strategy Based Approaches in Combating Intrusion and Threats PDF
C. Manusankar, K. Ayyappadas, T. Rajendran, Dr.S Karthik 31-40
Malicious Impostor Email Prevention Using Randomly Encrypted Address Book PDF
R. Rajesh Perumal, J. Vinu 41-47
Identification of P2P Traffic across the Networks: A Survey PDF
M. Sadish Sendil, M. Kavitha, U. Kaleelurrahaman, Dr S. Karthik, Dr. N. Nagarajan 48-52
Security for Web Applications Using Wiretap Library PDF
Vanitha Akinapalli, A. Sanjeeva Raju, Shylaja Akinapally, K. Madhavi 53-60
Fault Tolerant Dynamic Scheduling in Grid Environment PDF
K. Saravanan, Ponsy R.K. Sathiya Bhama 61-65
DPCS Approach in Peer-to-Peer Networks for Reducing the File Download Time PDF
V. Manoj Kumar, K. Madhavi, K. Sandhya Rani, T. Chalapathi 66-72
Neural Networks Based QoS Scheduling in WiMAX PDF
D. David Neels Pon Kumar, K. Murugesan, S. Raghavan, M. Suganthi 73-78

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616