Table of Contents
Articles
| A Logical Topology based Network Compositor for Packet Distribution System with Effective Edge Replacement |
PDF
|
| P.R. Nirmal Binu, S. Karthikeyan |
| Imitation Assault Detection in a Region Partitional Distributed Approach for a Wireless Sensor Network |
PDF
|
| Madhumathi Rajesh, Rama Sugavanam, G.R. Gangadevi |
| Optimized Power Management Protocol for Mobile Ad Hoc Networks |
PDF
|
| R. Nandha Kumar, I. Mohan |
| An Energy Efficient Prediction Based Object Tracking Sensor Networks |
PDF
|
| Dr.R.S. Bhuvaneeswaran, M. Sujatha, S. Sivaranjani |
| A New Efficient Geographic Multicast Protocol in Multicasting over Mobile Ad Hoc Networks for Qos Improvements |
PDF
|
| N. Renuka Devi, R. Niranchana |
| TAB -Ticketing and Blinding for Realizing Anonymity and Traceability in Wireless Mesh Networks |
PDF
|
| P. Saranya Devi, S. Shanmuga Preetha, S. Athilakshmi |
| Email Phishing Processing with Symmetric Key Cryptography via Network Credential |
PDF
|
| A. Prabhu Chakkaravarthy |
| Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing |
PDF
|
| M.N. Divakar, C. K. RajuTumkur |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616