Open Access
Subscription or Fee Access
Table of Contents
Articles
Study and Analysis of a New Data Encryption Technique Using Special Symbols Shifting | |
Sayani Manna, Satarupa Chatterjee, Tuhina Koley, Monali Mukherjee, Sanjay Chakraborty | 311-315 |
A High Throughput Pattern Matching Using Byte Filtered Bit_Split Algorithm | |
C.R. Rathish, P. Devasundar | 316-319 |
Enhancement of Video Streaming Quality in Lossy Wireless Mesh Network | |
D. Ramesh, D. Ayya Muthukumar | 320-323 |
Cloud Computing: A Next Generation Revolution in IT with e-Governance | |
Vivek Tiwari, Umesh Bindal, Shailesh Pandey | 324-330 |
New Data Encryption Standard Algorithm | |
C.V. Anchugam | 331-336 |
Fuzzy-Ant Based Dynamic Routing on Large Road Networks | |
M. Geetha, Dr.G.M. Kadhar Nawaz | 337-342 |
Managing Trust and Detecting the Guilty Party in P2P Networks | |
G. Nandhini, T. Kaleeswari, J. Brundha, G. MuthuKumar | 343-346 |
Entropy Variation Based Detecting DDoS Attack in Large Scale Networks | |
M. Uthaya Kumar, B. Aysha Banu | 347-355 |
Ensuring Security and Dynamic Operation Support for Storage Services in Cloud Computing | |
V.K. Deepa, S. Jothichellammal | 356-359 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616