

Table of Contents
Articles
Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System |
PDF
![]() |
Dipti Balasaheb Bansode, Amar Buchade | 317-320 |
Performance Evaluation of Wireless Networks |
PDF
![]() |
R. C. Jaiswal, S. V. Mitkari, S. D. Lokhande | 321-325 |
An Approach for Scaling Resources for Applications in Cloud |
PDF
![]() |
Ankita A. Rathor, Amar Buchade | 326-330 |
Privacy Preserving and Data Security Using Anonymous Cloud and RSA |
PDF
![]() |
P. Kharat, A. Buchade | 331-334 |
Underwater Wireless Sensor Networks (UWSN), Architecture, Routing Protocols, Simulation and Modeling Tools, Localization, Security Issues and Some Novel Trends |
PDF
![]() |
S. EL- Rabaie, D. Nabil, R. Mahmoud, Mohammed A. Alsharqawy | 335-354 |
Cross Layer Based Intrusion Detection in MANET Using Intelligent Paradigms |
PDF
![]() |
Dr.G. Usha, Dr.K. Mahalakshmi | 355-360 |
A New Load Balancing Algorithm for Cloud Computing |
PDF
![]() |
Younes Ranjbar, Ali Ghaffari | 361-366 |
Analysis and Impacts on Dynamic Load Balancing Techniques in Networks |
PDF
![]() |
N Baskar, A D. Bharath | 367-369 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616