Open Access
Subscription or Fee Access
Table of Contents
Articles
A Secure - Acknowledgment Based Detection Approach for MANET’S | |
V. Sathya | 153-162 |
A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs | |
K. Gayathri, S. Sivachandiran | 163-167 |
Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique | |
M. Sudha, Neelima Jhavar | 168-172 |
Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network | |
P. Jenis, P.K. Poonguzhali, M. Jeeva Jebakani | 173-175 |
Security Using RSA Algorithm in Opportunistic Localization for Underwater Sensor Networks | |
Dr.P. Vijayalakshmi, S.B. Saritha | 176-179 |
A Study on Authentication Challenges & Approaches | |
C. Subramanian, S. Stephen raj | 180-182 |
Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography | |
K. Saranya, P. Kavitha | 183-186 |
Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network | |
T.K. Ujina, Dr. Sai Shanmuga Raja | 187-191 |
A Study on Innovative Testing Techniques | |
S. Somasundaram | 192-194 |
Semi Trusted Third Party Using Dynamic Grid System for Location Based Services | |
Rupa Debnath, G. Senthil Velan | 195-199 |
Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage | |
S. Nalini Poornima, Dr. R. S. Ponmagal | 200-204 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616