![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
N Level Unicode Position Character Length Cipher for Securing Smart Card |
PDF
![]() |
Dr. P. Vijayakumar, M. Palanivelu, M. Latha Karthigaa, N. Balachandar, M. Karthi | 153-158 |
An Efficient Minimum-process Checkpointing Scheme for Non-Deterministic Mobile Distributed Systems |
PDF
![]() |
Parveen Kumar, Preeti Gupta, Anil Kumar Solanki | 159-166 |
An Empirical Study of Replication Algorithms in Content Distribution Networks |
PDF
![]() |
J. Amutharaj, S. Radhakrishnan | 167-174 |
Advanced Intrusion Detection and Prevention System with Rule Based Mining Techniques and using Prevention Policies over an Internet |
PDF
![]() |
P.S. Revankar, A.B. Pawar | 175-187 |
A Frame work for Code Injection Attack Investigation in Windows Environment |
PDF
![]() |
Deepak Singh Tomar, J.L. Rana, S.C. Shrivastava | 188-194 |
Comparison of Wavelengths for Various Atmospheric Effects on FSO Link – A Comprehensive Study of Atmospheric Turbulence, Attenuation & Scattering, and Spatial & Temporal Detection Techniques |
PDF
![]() |
A. Jabeena, Sandeep Gottipati, K. Mishra | 195-201 |
Development and Implementation of Mobile Augmented Reality Systems Application (Live Streaming through Mobile) |
PDF
![]() |
K. H. Wandra, Dr. Ketan Kotecha | 202-205 |
A Survey on Various Aspects of Quantum Cryptography |
PDF
![]() |
R.K. Pateriya, Dr.J.L. Rana, Anupriya Gupta | 206-212 |
Scalable Energy Efficient Ad-Hoc on Demand Distance Vector Routing Protocol |
PDF
![]() |
Mandhir Kaur, Jasbir Singh Saini, Prabhneet Kaur | 213-219 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616