Vol 2, No 7 (2010)

Open Access Open Access  Restricted Access Subscription or Fee Access

Table of Contents


N Level Unicode Position Character Length Cipher for Securing Smart Card PDF
Dr. P. Vijayakumar, M. Palanivelu, M. Latha Karthigaa, N. Balachandar, M. Karthi 153-158
An Efficient Minimum-process Checkpointing Scheme for Non-Deterministic Mobile Distributed Systems PDF
Parveen Kumar, Preeti Gupta, Anil Kumar Solanki 159-166
An Empirical Study of Replication Algorithms in Content Distribution Networks PDF
J. Amutharaj, S. Radhakrishnan 167-174
Advanced Intrusion Detection and Prevention System with Rule Based Mining Techniques and using Prevention Policies over an Internet PDF
P.S. Revankar, A.B. Pawar 175-187
A Frame work for Code Injection Attack Investigation in Windows Environment PDF
Deepak Singh Tomar, J.L. Rana, S.C. Shrivastava 188-194
Comparison of Wavelengths for Various Atmospheric Effects on FSO Link – A Comprehensive Study of Atmospheric Turbulence, Attenuation & Scattering, and Spatial & Temporal Detection Techniques PDF
A. Jabeena, Sandeep Gottipati, K. Mishra 195-201
Development and Implementation of Mobile Augmented Reality Systems Application (Live Streaming through Mobile) PDF
K. H. Wandra, Dr. Ketan Kotecha 202-205
A Survey on Various Aspects of Quantum Cryptography PDF
R.K. Pateriya, Dr.J.L. Rana, Anupriya Gupta 206-212
Scalable Energy Efficient Ad-Hoc on Demand Distance Vector Routing Protocol PDF
Mandhir Kaur, Jasbir Singh Saini, Prabhneet Kaur 213-219

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ISSN: 0974 – 9616