Open Access
Subscription or Fee Access
Table of Contents
Articles
Virtual Password Obscuring in Avoidance of Keyloggers | |
J. Jeysree | 371-374 |
Improving the Performance of Interactive TCP Applications using End-Point Techniques | |
Varun G. Menon, Alfred Raja Melvin | 375-379 |
A New Protocol Stack for 6LoWPAN – An Overview | |
R.B. Jagadeesha | 380-389 |
LIGHTMQ Provider for Java Message Service | |
Sushila Aghav, Shailesh Deshpande, Prajyot Jadhav | 390-395 |
Workflow Based Resource Allocation and Monitoring Using Mobile Agents | |
L. Venkatakrishnan, T.V.U. Kiran Kumar, M.A. Dorairengaswamy | 396-400 |
Gaze-based Password Entry Systems | |
S. Yamini | 401-403 |
A Survey of Peer To Peer Network | |
R. Maruthaveni, S. kalaivani | 404-407 |
Improved Cyber Security by Hardware Acceleration of Scalable Encryption Algorithm in OpenSSL | |
A. Thiruneelakandan, N. Hemavathy | 408-414 |
An Efficient Reliable Protocol in AD-Hoc Network Using A Cross Layer Approach via TCP | |
R. Thamizhamuthu, G. Ilanchezhia Pandian, Dr.P. Sheik Abdul Khader | 415-417 |
Automatic River Pollutant Monitoring & Flood Detection Using Sensor Web | |
G. Srinivasan, L. Prabahar, B. Muthukrishnavinayagam | 418-423 |
Adaptive Routing for QoS in Manet by Using Cross Layer Architecture | |
P. Chitra, G. Ilanchezhia Pandian, Dr.P. Sheik Abdul Khader | 424-426 |
Privacy Protected Query Processing using Advanced Location Based Service | |
U. Nithyapriya, M. Kalimuthu | 427-432 |
An E-Epidemic Model for Developing a Defense Mechanism against Computer Worms | |
Upendra Kumar, Bimal Kumar Mishra, G. Sahoo | 433-435 |
A Quarantine Model for Malicious Objects in Computer Network | |
Aditya Kumar Singh, Bimal Kumar Mishra | 436-440 |
A Distributed Time Delay Model of Worms in Computer Network | |
Samir Kumar Pandey, Bimal Kumar Mishra, Prasanna Kumar Satpathy | 441-447 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616