

Table of Contents
Articles
Fault Forbearance Methods for Randomized Intrusion Tolerance |
PDF
![]() |
R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi | 379-382 |
Analysis and Implementation of Optimized Image Encryption Algorithm using Bhramgupta-Bhaskara Equation |
PDF
![]() |
Sanjay Chaudhari, Dr. Deepak Dembla | 383-388 |
Implementation of EESCP Protocol in Mobile Adhoc Networks |
PDF
![]() |
P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan | 389-394 |
Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity |
PDF
![]() |
G. Sankareeswari, C. Jeganathan | 395-401 |
Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility |
PDF
![]() |
Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari | 402-406 |
Dynamic Job and Resource Grouping-based Scheduling in Grid Computing |
PDF
![]() |
P. Ashok | 407-411 |
Methods of Reducing False Alerts by Intrusion Detection System |
PDF
![]() |
PrajaktaSandeep Jadhav | 412-416 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616