Table of Contents
Articles
| Secure Data Deduplication at Client Side and in Cloud Storage with Application Aware System |
PDF
|
| Dipti Balasaheb Bansode, Amar Buchade | 317-320 |
| Performance Evaluation of Wireless Networks |
PDF
|
| R. C. Jaiswal, S. V. Mitkari, S. D. Lokhande | 321-325 |
| An Approach for Scaling Resources for Applications in Cloud |
PDF
|
| Ankita A. Rathor, Amar Buchade | 326-330 |
| Privacy Preserving and Data Security Using Anonymous Cloud and RSA |
PDF
|
| P. Kharat, A. Buchade | 331-334 |
| Underwater Wireless Sensor Networks (UWSN), Architecture, Routing Protocols, Simulation and Modeling Tools, Localization, Security Issues and Some Novel Trends |
PDF
|
| S. EL- Rabaie, D. Nabil, R. Mahmoud, Mohammed A. Alsharqawy | 335-354 |
| Cross Layer Based Intrusion Detection in MANET Using Intelligent Paradigms |
PDF
|
| Dr.G. Usha, Dr.K. Mahalakshmi | 355-360 |
| A New Load Balancing Algorithm for Cloud Computing |
PDF
|
| Younes Ranjbar, Ali Ghaffari | 361-366 |
| Analysis and Impacts on Dynamic Load Balancing Techniques in Networks |
PDF
|
| N Baskar, A D. Bharath | 367-369 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616