

Table of Contents
Articles
Algorithm for Cryptanalysis with Application to Data Encryption Standard |
PDF
![]() |
K. Ravikumar, Dr. A. Kannammal, S. A. Jameel | 240-244 |
Virtualization: A Foundation for Cloud Computing |
PDF
![]() |
Dr. Manoj Devare, Mehdi Sheikhalishahi, Dr. Lucio Grandinetti | 245-254 |
Qualitative Comparison of 2-Dimensional and 3-Dimensional Directed Geographical IP Traceback with Generalization to N Directions |
PDF
![]() |
A. Rajiv Kannan, Dr. K. Duaraiswamy, E. Sasikala | 255-259 |
IPv6 over Wireless Sensor Networks |
PDF
![]() |
Vivek S. Deshpande, Vasundhara V. Ghate | 260-267 |
Lingering Bandwidth Estimation to Optimize the Resource Utilization for Mobile Ad Hoc Networks |
PDF
![]() |
S. Suganya, Dr. S. Palaniammal | 268-272 |
Providing QOS for Mobile Ad-Hoc Network |
PDF
![]() |
A. Boomarani Malany, Dr. R. M. Chandrasekaran | 273-282 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616