Table of Contents
Articles
| Verifiable Secret Sharing protocol for Mobile Ad-hoc Networks |
PDF
|
| P.V. Siva Kumar, Dr. Rajasekhara Rao Kurra, Appala Naidu Tentu |
| An Optimized and Secured VPN with Web Service |
PDF
|
| A. Balasubramanian, A. Hemanth Kumar, R. Prasanna Venkatesan |
| Performance Comparison of Dynamic Source Routing Under Varying Traffic Patterns |
PDF
|
| Sanjeev Mahajan |
| Designing an Opportunistic Routing Scheme in Mobile Ad-Hoc Networks |
PDF
|
| V.P. Manikandan, A. Ajitha |
| Secure Probabilistic Location Verification for Wireless Sensor Networks |
PDF
|
| R. VidhyaLakshmi, G. Surya |
| Effective Shielding of Stressed Network from Flood Attacks |
PDF
|
| S. Angelin Joy, S. Sariga |
| Resource Aware and Reliable Routing in Heterogeneous WSNs |
PDF
|
| Fatma H. El-Fouly, Rabie A. Ramadan, Mohamed I. Mahmoud, Moawad I. Dessouky |
| Redistribution of Load in Cloud Using Load Rebalancing Algorithm with Data Security |
PDF
|
| R. Rajavadivu, K. Dhanalakshmi |
| LAROD-LoDiS - An Efficient Routing Algorithm for Intermittently Connected Mobile Ad Hoc Networks (IC-MANETs) |
PDF
|
| S. Monicka |
| Distance based Query Processing in Mobile Applications |
PDF
|
| K.S. Kannan, A. Manjula |
| Density Based Traffic Signal System Using Computer Vision |
PDF
|
| K. Vidhya, D. Anandhavalli |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616