![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
Risk-Based Kerberised Service with JINI in Pervasive Environment |
PDF
![]() |
M. Kavitha, D. Prakash | 525-529 |
Improved Cryptography for Avoiding Data Frauds on Mobile Devices |
PDF
![]() |
A. Sharmishta Desai | 530-533 |
The Design of a Group Communication System for Distributed and Complex Systems |
PDF
![]() |
F. Lassoued, R. Bouallegue | 534-540 |
Blocking the Misbehaving Access using Ticket Based Method in Anonymous Networks |
PDF
![]() |
C. Jackulin, D. Elavarasi, Vivian Rachel Jayson | 541-547 |
Distributed System Architecture for Grid Resource Monitoring and Resource State Prediction |
PDF
![]() |
S. Sabeetha Saraswathi, S. Mohana, N. Vijayaraj, S. Imavathy, S. Mahalakshmi | 548-551 |
Mobile Communication: SMS Security Review (Issues, Attacks and Preventive Measures) |
PDF
![]() |
Gurjeet Kaur, Monika Sachdeva, Dr.K.K. Saluja | 552-559 |
A Study on Pros and Cons of the Cloud Computing |
PDF
![]() |
J. Vanitha, C. Mallika, A. Hema, K. Durga, S. Visalatchy | 560-563 |
Multi Factor Authentication using Steganography and One Time Password |
PDF
![]() |
S. Arun Kumar, S. Vijayakumari, B.Dharani Chander | 564-567 |
A Framework for Dynamic Multipath Self Reconfiguration Mechanism in Wireless Mesh Network |
PDF
![]() |
R. Lakshmipriya, S. Rajasoundaran, S. Janakiraman | 568-572 |
Ultra High Tech Multi-Pipelining String Matching for Deep Packet Inspection |
PDF
![]() |
N. Kannaiya Raja, Dr.K. Arulanandam, R. Prabhu | 573-583 |
Improving Network Lifetime using Mobile Element |
PDF
![]() |
C. Jeyaram, Anitha Julian | 584-587 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616