Table of Contents
Articles
| Coverage and Connectivity Analysis of ADHOC Networks in Presence of Channel Randomness |
PDF
|
| T. Shankar, Vurandala Kiran Kumar, Dr.S. Shanmugavel | 152-157 |
| S-MAC for Wireless Ad Hoc Networks Using Directional Antennas |
PDF
|
| P. Sai Kiran, Dr.L.S.S. Reddy | 158-165 |
| Impact of Varying Node Mobility on Performance of Mobile Ad hoc Networks |
PDF
|
| Sanjeev Kumar, Yogesh Chaba | 166-171 |
| Middleware Architectural Framework for Secured Services in MANETs |
PDF
|
| T. Abdul Razak, R. Balasubramanian | 172-176 |
| Empirical Study of Peer to Peer Network Simulators |
PDF
|
| Kaushik H. Raviya, Prashant M. Jadav, C.K. Bhensdadia | 177-182 |
| Wipe Out Brute Force and Exterminate Malware - Based Attacks Using High Secure One-Time Password by Grid-Clear-CAPTCHA (GCC) – Analytical Study |
PDF
|
| M. Viju Prakash, S. Jeya Shobana, P. Alwin Infant | 183-192 |
| Peak to Average Power Reduction (PAPR) in OFDM (Using MATLAB Software) |
PDF
|
| Taru Mahajan, Mandeep Kour | 193-202 |
| A General Approach for Defending Code-Injection Attacks |
PDF
|
| J. Sajeev, Rose Rani John, I. Bildass Santhosham | 203-206 |
| Modeling and Study of Shielding Effectiveness of Enclosure |
PDF
|
| G. Sindura, P. Salil, K. Ram Prakash | 207-211 |
| Novel Approaches to Prevent Spams |
PDF
|
| Bastin Rogers, Jasmine Chandralega | 212-215 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616