

Table of Contents
Articles
Design of 64x64 Bit Parity Preserving Reversible Vedic Multiplier Using Carry Look Ahead Adder |
PDF
![]() |
Akansha Sahu, Anil Kumar Sahu | 247-254 |
Secure Socket Layer and its Security Analysis |
PDF
![]() |
Deepika Bansal, Priya Sethi, Shipra Kataria | 255-259 |
DomainKeys Identified Mail |
PDF
![]() |
Shipra Kataria, Deepika Bansal, Priya Sethi | 260-264 |
Visual Cryptography |
PDF
![]() |
Priya Sethi, Shipra Kataria, Deepika Bansal | 265-268 |
Performance Evaluation of AODV and DSDV Routing Protocols in Self Organizing Architecture |
PDF
![]() |
Ruby Bhagat, Nitika Chowdhary, Jyoteesh Malhotra | 269-272 |
An Efficient Transmission of Data in MANET using Position Based Opportunistic Routing Protocol |
PDF
![]() |
P. Kalaivani, S. Niveda, P. Nanthini | 273-275 |
Authenticated Anonymous Secure Routing for Mobile Adhoc Networks |
PDF
![]() |
K. Geetha Nandhini, A. Anu Priya, C. Kiruthika, B. Deepa | 276-279 |
HONEYPOT: Network Security |
PDF
![]() |
A. Dayana, S. Saranya, B. Geethamani, R. Kashturi | 280-282 |
Bilinear Aggregate Signature and PDP Encryption in Audit Service for Cloud Storage |
PDF
![]() |
B. Premkumar, R.S. Ponmagal | 283-286 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616