Open Access
Subscription or Fee Access
Table of Contents
Articles
Risk-Based Kerberised Service with JINI in Pervasive Environment | |
M. Kavitha, D. Prakash | 525-529 |
Improved Cryptography for Avoiding Data Frauds on Mobile Devices | |
A. Sharmishta Desai | 530-533 |
The Design of a Group Communication System for Distributed and Complex Systems | |
F. Lassoued, R. Bouallegue | 534-540 |
Blocking the Misbehaving Access using Ticket Based Method in Anonymous Networks | |
C. Jackulin, D. Elavarasi, Vivian Rachel Jayson | 541-547 |
Distributed System Architecture for Grid Resource Monitoring and Resource State Prediction | |
S. Sabeetha Saraswathi, S. Mohana, N. Vijayaraj, S. Imavathy, S. Mahalakshmi | 548-551 |
Mobile Communication: SMS Security Review (Issues, Attacks and Preventive Measures) | |
Gurjeet Kaur, Monika Sachdeva, Dr.K.K. Saluja | 552-559 |
A Study on Pros and Cons of the Cloud Computing | |
J. Vanitha, C. Mallika, A. Hema, K. Durga, S. Visalatchy | 560-563 |
Multi Factor Authentication using Steganography and One Time Password | |
S. Arun Kumar, S. Vijayakumari, B.Dharani Chander | 564-567 |
A Framework for Dynamic Multipath Self Reconfiguration Mechanism in Wireless Mesh Network | |
R. Lakshmipriya, S. Rajasoundaran, S. Janakiraman | 568-572 |
Ultra High Tech Multi-Pipelining String Matching for Deep Packet Inspection | |
N. Kannaiya Raja, Dr.K. Arulanandam, R. Prabhu | 573-583 |
Improving Network Lifetime using Mobile Element | |
C. Jeyaram, Anitha Julian | 584-587 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616