Open Access
Subscription or Fee Access
Table of Contents
Articles
Fault Forbearance Methods for Randomized Intrusion Tolerance | |
R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi | 379-382 |
Analysis and Implementation of Optimized Image Encryption Algorithm using Bhramgupta-Bhaskara Equation | |
Sanjay Chaudhari, Dr. Deepak Dembla | 383-388 |
Implementation of EESCP Protocol in Mobile Adhoc Networks | |
P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan | 389-394 |
Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity | |
G. Sankareeswari, C. Jeganathan | 395-401 |
Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility | |
Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari | 402-406 |
Dynamic Job and Resource Grouping-based Scheduling in Grid Computing | |
P. Ashok | 407-411 |
Methods of Reducing False Alerts by Intrusion Detection System | |
PrajaktaSandeep Jadhav | 412-416 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616