Table of Contents
Articles
| E Market Place Security Using Elliptic Curve Distributed Key |
PDF
|
| K. Ravikumar, Dr. A. Kannammal, Balamurugan Balamurugan, A. Abirami, Durgadevi Durgadevi, Sameswari Sameswari | 830-832 |
| Raw Era in Cloud Computing |
PDF
|
| K. Srinivasa Rao, Dr. Shaik Nazeer, Syed Ziaur Rahman | 833-836 |
| Ant Agent Semantic Query Routing in Peer to Peer Networks |
PDF
|
| U.V. Arivazhagu, Dr.S. Srinivasan | 837-839 |
| A Survey on Job Scheduling and Load Balancing in Computational Grid |
PDF
|
| P. Dhivya, R. Giriraj | 840-842 |
| Review of DNA Cryptology |
PDF
|
| U. Noorul Hussain, T. Chithralekha | 843-849 |
| Consistency Management Strategies for Data Replication in MANET |
PDF
|
| S.K. Hameeda, Y. Chitti Babu, Dr.P. Harini, Syed Azahad | 850-853 |
| An Enhanced Density-Aware Routing Protocol Using Backoff Mechanism for VANET |
PDF
|
| M. Subha, T. Revathi | 854-858 |
| An Improved LEACH Protocol with Fuzzy Logic Technique |
PDF
|
| J. Rathi, G. Rajendran | 859-863 |
| An Implementation of Security in VoIP using Modified Shamir‟s Secret Sharing Algorithm |
PDF
|
| K. Maheswari, Dr. M. Punithavalli | 864-868 |
| Multicast Multi-path Power Efficient Routing in MANET |
PDF
|
| M. Raghavendra Rao, K. Eswar, Dr.P. Harini, Syed. Azhad | 869-872 |
| A Survey on Grid Scheduling Algorithms-Problems and Directions |
PDF
|
| G. Saravanan, Dr.V. Gopalakrishna | 873-877 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616