Table of Contents
Articles
| Fault Forbearance Methods for Randomized Intrusion Tolerance |
PDF
|
| R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi | 379-382 |
| Analysis and Implementation of Optimized Image Encryption Algorithm using Bhramgupta-Bhaskara Equation |
PDF
|
| Sanjay Chaudhari, Dr. Deepak Dembla | 383-388 |
| Implementation of EESCP Protocol in Mobile Adhoc Networks |
PDF
|
| P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan | 389-394 |
| Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity |
PDF
|
| G. Sankareeswari, C. Jeganathan | 395-401 |
| Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility |
PDF
|
| Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari | 402-406 |
| Dynamic Job and Resource Grouping-based Scheduling in Grid Computing |
PDF
|
| P. Ashok | 407-411 |
| Methods of Reducing False Alerts by Intrusion Detection System |
PDF
|
| PrajaktaSandeep Jadhav | 412-416 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616