Table of Contents
Articles
| Risk-Based Kerberised Service with JINI in Pervasive Environment |
PDF
|
| M. Kavitha, D. Prakash | 525-529 |
| Improved Cryptography for Avoiding Data Frauds on Mobile Devices |
PDF
|
| A. Sharmishta Desai | 530-533 |
| The Design of a Group Communication System for Distributed and Complex Systems |
PDF
|
| F. Lassoued, R. Bouallegue | 534-540 |
| Blocking the Misbehaving Access using Ticket Based Method in Anonymous Networks |
PDF
|
| C. Jackulin, D. Elavarasi, Vivian Rachel Jayson | 541-547 |
| Distributed System Architecture for Grid Resource Monitoring and Resource State Prediction |
PDF
|
| S. Sabeetha Saraswathi, S. Mohana, N. Vijayaraj, S. Imavathy, S. Mahalakshmi | 548-551 |
| Mobile Communication: SMS Security Review (Issues, Attacks and Preventive Measures) |
PDF
|
| Gurjeet Kaur, Monika Sachdeva, Dr.K.K. Saluja | 552-559 |
| A Study on Pros and Cons of the Cloud Computing |
PDF
|
| J. Vanitha, C. Mallika, A. Hema, K. Durga, S. Visalatchy | 560-563 |
| Multi Factor Authentication using Steganography and One Time Password |
PDF
|
| S. Arun Kumar, S. Vijayakumari, B.Dharani Chander | 564-567 |
| A Framework for Dynamic Multipath Self Reconfiguration Mechanism in Wireless Mesh Network |
PDF
|
| R. Lakshmipriya, S. Rajasoundaran, S. Janakiraman | 568-572 |
| Ultra High Tech Multi-Pipelining String Matching for Deep Packet Inspection |
PDF
|
| N. Kannaiya Raja, Dr.K. Arulanandam, R. Prabhu | 573-583 |
| Improving Network Lifetime using Mobile Element |
PDF
|
| C. Jeyaram, Anitha Julian | 584-587 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616