Table of Contents
Articles
| A Secure - Acknowledgment Based Detection Approach for MANET’S |
PDF
|
| V. Sathya | 153-162 |
| A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs |
PDF
|
| K. Gayathri, S. Sivachandiran | 163-167 |
| Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique |
PDF
|
| M. Sudha, Neelima Jhavar | 168-172 |
| Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network |
PDF
|
| P. Jenis, P.K. Poonguzhali, M. Jeeva Jebakani | 173-175 |
| Security Using RSA Algorithm in Opportunistic Localization for Underwater Sensor Networks |
PDF
|
| Dr.P. Vijayalakshmi, S.B. Saritha | 176-179 |
| A Study on Authentication Challenges & Approaches |
PDF
|
| C. Subramanian, S. Stephen raj | 180-182 |
| Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography |
PDF
|
| K. Saranya, P. Kavitha | 183-186 |
| Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network |
PDF
|
| T.K. Ujina, Dr. Sai Shanmuga Raja | 187-191 |
| A Study on Innovative Testing Techniques |
PDF
|
| S. Somasundaram | 192-194 |
| Semi Trusted Third Party Using Dynamic Grid System for Location Based Services |
PDF
|
| Rupa Debnath, G. Senthil Velan | 195-199 |
| Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage |
PDF
|
| S. Nalini Poornima, Dr. R. S. Ponmagal | 200-204 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616