Table of Contents
Articles
| Detecting and Isolating Malicious Packet Losses |
PDF
|
| K. Balasubramanian, R. Anandraj | 1-3 |
| Traffic Facet Psychoanalysis through Cryptography for an Attack |
PDF
|
| B. Muthulakshmi | 4-7 |
| Hybrid Low Power Encoded Multiplier for Montgomery Modular Multiplication and Efficient ECC Processor |
PDF
|
| B. Muthukumar, S. Jeevananthan | 8-15 |
| Monitoring and Control System for Precision Farming using WSN |
PDF
|
| Shiv Sutar, Swapnita Patil, Jayesh Sarnaik, Priyanka Priyanka, Komal Komal | 16-21 |
| VLSI Implementation of Data Security Architecture |
PDF
|
| Dilip Thomas, K. S. M. Panicker | 22-29 |
| A Review on the Impact of Nash Equilibrium in the Performance of Overlay Networks |
PDF
|
| S. Nandhini, S. Prayla Shyry, S. Emalda Roslin, N. M. Nandhitha, V. Ramachandran | 30-35 |
| Real-Time Wireless Sensor Network for Temperature Monitoring |
PDF
|
| Swati Mahabole, Dr. Sanjay Patil | 36-38 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616