Browse Title Index


 
Issue Title
 
Vol 3, No 4 (2011) A Process of Delivering the Mail Message in Domain Level Authentication Framework Using Grid Computing Abstract
B. Muthukumar, P. Banumathi, V. Karthik, R. Vidhya
 
Vol 11, No 4 (2019) A Proposal on Novel Cloud Scheduling Using Soft Computing Techniques Abstract
B. Kanagalakshmi
 
Vol 8, No 3 (2016) A QOS Oriented Analysis in WIMAX Abstract
Lovepreet Kaur, Amandeep Kaur
 
Vol 3, No 6 (2011) A Quarantine Model for Malicious Objects in Computer Network Abstract
Aditya Kumar Singh, Bimal Kumar Mishra
 
Vol 4, No 11 (2012) A Reliability Model for the Task Scheduling in Distributed Systems based on Fuzzy Theory Abstract
Sagar Gulati, P.K. Yadav, K. Bhatia
 
Vol 7, No 1 (2015) A Review of Para-Virtualized Environment for Data Storage Management Abstract
Ketan M. Parmar, Aspriha R. Das
 
Vol 11, No 10 (2019) A Review on Application Perspective of IoT and Wireless Sensor Network (WSN) Abstract
K. Ashton, S. Sadik
 
Vol 12, No 3-5 (2020) A Review on Routing Protocols in Wireless Sensor Networks Abstract
J De Graaff, W Zijp
 
Vol 4, No 1 (2012) A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks Abstract
S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran
 
Vol 12, No 11-12 (2020) A Review on Wireless Networks and it's Architectures Abstract
Ruqiang Yan, Hanghang Sun
 
Vol 3, No 9 (2011) A Scalable Overlay Multicast Architecture for Large-Scale Applications Abstract
N. Murali, K. Kumaran
 
Vol 1, No 8 (2009) A Scheduling Algorithm for Coarse Grain Applications with Spry Technique Abstract
S. V. Sudha, K. Thanushkodi
 
Vol 8, No 5 (2016) A Secure - Acknowledgment Based Detection Approach for MANET’S Abstract
V. Sathya
 
Vol 7, No 2 (2015) A Secure Authentication Method using Acknowledgment-based IDS for MANET Abstract
Dr. G. Komarasamy, G. Gowthaman
 
Vol 4, No 8 (2012) A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks Abstract
N. Theja, T. Jayakumari
 
Vol 4, No 10 (2012): Regular Issue A Secure Scheme for Denial-of-Service Attacks in Wireless Sensor Networks Abstract
K. Pandi Karthi Kanmani, E. Srie Vidhya Janani, Dr.P. Ganesh Kumar
 
Vol 1, No 1 (2009) A Secured Hybrid Architecture Model for Internet Banking (E-Banking) Abstract
R. Ganesan, Dr. K. Vivekanandan
 
Vol 3, No 15 (2011) A Short Survey on Routing Protocols in Mobile Ad-Hoc Networks Abstract
M. Sunitha, B. Babitha, J. Samatha
 
Vol 4, No 12 (2012) A Study about Concepts, Virtualization, Benefits and Challenges of Cloud Computing Abstract
G. Sekar, Dr.N..M. Elango
 
Vol 4, No 12 (2012) A Study and Design of Encryption Less Protocol using Quantum Bits for Secure Communication in Wireless Network Abstract
K. Maharajan, M. JayaLakshmi, Dr.B. Paramasivan, V. SivaKumar
 
Vol 10, No 5 (2018) A Study Based On Different Protocols to Enhance Security for Data Dissemination in Wireless Sensor Networks Abstract
Divya Divya, Khateeja Rukshana, Shifana Begum, Akhilraj V. Gadagkar
 
Vol 5, No 6 (2013) A Study of DASH7 Technology: An Overview Abstract
R.B. Jagadeesha, Jose Oliveira
 
Vol 11, No 10 (2019) A Study on Applications of Security Algorithms: Attention to RSA and DH Algorithms Abstract
T. W. Hong, S. G. Miller
 
Vol 8, No 5 (2016) A Study on Authentication Challenges & Approaches Abstract
C. Subramanian, S. Stephen raj
 
Vol 14, No 1 (2022) A Study on Cyber Attack in Internet of Things Abstract
Dr. S. Banumathi, R. Abisha
 
76 - 100 of 963 Items << < 1 2 3 4 5 6 7 8 9 10 > >> 


ISSN: 0974 – 9616