Table of Contents
Articles
| Study and Analysis of a New Data Encryption Technique Using Special Symbols Shifting |
PDF
|
| Sayani Manna, Satarupa Chatterjee, Tuhina Koley, Monali Mukherjee, Sanjay Chakraborty | 311-315 |
| A High Throughput Pattern Matching Using Byte Filtered Bit_Split Algorithm |
PDF
|
| C.R. Rathish, P. Devasundar | 316-319 |
| Enhancement of Video Streaming Quality in Lossy Wireless Mesh Network |
PDF
|
| D. Ramesh, D. Ayya Muthukumar | 320-323 |
| Cloud Computing: A Next Generation Revolution in IT with e-Governance |
PDF
|
| Vivek Tiwari, Umesh Bindal, Shailesh Pandey | 324-330 |
| New Data Encryption Standard Algorithm |
PDF
|
| C.V. Anchugam | 331-336 |
| Fuzzy-Ant Based Dynamic Routing on Large Road Networks |
PDF
|
| M. Geetha, Dr.G.M. Kadhar Nawaz | 337-342 |
| Managing Trust and Detecting the Guilty Party in P2P Networks |
PDF
|
| G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar | 343-346 |
| Entropy Variation Based Detecting DDoS Attack in Large Scale Networks |
PDF
|
| M. Uthaya Kumar, B. Aysha Banu | 347-355 |
| Ensuring Security and Dynamic Operation Support for Storage Services in Cloud Computing |
PDF
|
| V.K. Deepa, S. Jothichellammal | 356-359 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616