

Table of Contents
Articles
Verifiable Secret Sharing protocol for Mobile Ad-hoc Networks |
PDF
![]() |
P.V. Siva Kumar, Dr. Rajasekhara Rao Kurra, Appala Naidu Tentu |
An Optimized and Secured VPN with Web Service |
PDF
![]() |
A. Balasubramanian, A. Hemanth Kumar, R. Prasanna Venkatesan |
Performance Comparison of Dynamic Source Routing Under Varying Traffic Patterns |
PDF
![]() |
Sanjeev Mahajan |
Designing an Opportunistic Routing Scheme in Mobile Ad-Hoc Networks |
PDF
![]() |
V.P. Manikandan, A. Ajitha |
Secure Probabilistic Location Verification for Wireless Sensor Networks |
PDF
![]() |
R. VidhyaLakshmi, G. Surya |
Effective Shielding of Stressed Network from Flood Attacks |
PDF
![]() |
S. Angelin Joy, S. Sariga |
Resource Aware and Reliable Routing in Heterogeneous WSNs |
PDF
![]() |
Fatma H. El-Fouly, Rabie A. Ramadan, Mohamed I. Mahmoud, Moawad I. Dessouky |
Redistribution of Load in Cloud Using Load Rebalancing Algorithm with Data Security |
PDF
![]() |
R. Rajavadivu, K. Dhanalakshmi |
LAROD-LoDiS - An Efficient Routing Algorithm for Intermittently Connected Mobile Ad Hoc Networks (IC-MANETs) |
PDF
![]() |
S. Monicka |
Distance based Query Processing in Mobile Applications |
PDF
![]() |
K.S. Kannan, A. Manjula |
Density Based Traffic Signal System Using Computer Vision |
PDF
![]() |
K. Vidhya, D. Anandhavalli |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616