

Table of Contents
Articles
Risk-Aware Approach for Handling Routing Attacks And Selfishness using RBNC in MANET |
PDF
![]() |
P. Hemavathy, Kanmani Govindaraj, Karthika Kothandam | 139-144 |
A Collusion-Resistant Acknowledgement-based Scheme for Mitigation of Packet Drop in MANETs |
PDF
![]() |
G.D. Anjaly, J.C. Kavithaï€ | 145-149 |
GF (2m) Based Low Complexity Multiplier for Elliptic Curve Cryptography Systems |
PDF
![]() |
K. Rajadurga, S. Ram Kumar | 150-155 |
A Comparison of Data Replication Schemes to Achieve an Optimum Query Delay and Efficient Data Access in MANETs |
PDF
![]() |
Joslin Anie Abraham, Dr. C.D. Suriyakala | 156-160 |
Effect of Propagation Models on Analysis of MANET Routing Protocols |
PDF
![]() |
K. B. Wane, A. D. Bhoi, Dr. R. D. Kharadkar, Dr. A. Y. Deshmukh | 161-165 |
Efficient Authentication and Security of Multicast Streams over Lossy Channels Using Quantum Cryptography |
PDF
![]() |
D. Pavithra, S. Anitha | 166-169 |
Novel Multicast Key Authentication Protocol |
PDF
![]() |
S. Sasikala Devi, Dr.Antony Selvadoss Thanamani | 170-173 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616