

Table of Contents
Articles
A Secure - Acknowledgment Based Detection Approach for MANET’S |
PDF
![]() |
V. Sathya | 153-162 |
A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs |
PDF
![]() |
K. Gayathri, S. Sivachandiran | 163-167 |
Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique |
PDF
![]() |
M. Sudha, Neelima Jhavar | 168-172 |
Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network |
PDF
![]() |
P. Jenis, P.K. Poonguzhali, M. Jeeva Jebakani | 173-175 |
Security Using RSA Algorithm in Opportunistic Localization for Underwater Sensor Networks |
PDF
![]() |
Dr.P. Vijayalakshmi, S.B. Saritha | 176-179 |
A Study on Authentication Challenges & Approaches |
PDF
![]() |
C. Subramanian, S. Stephen raj | 180-182 |
Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography |
PDF
![]() |
K. Saranya, P. Kavitha | 183-186 |
Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network |
PDF
![]() |
T.K. Ujina, Dr. Sai Shanmuga Raja | 187-191 |
A Study on Innovative Testing Techniques |
PDF
![]() |
S. Somasundaram | 192-194 |
Semi Trusted Third Party Using Dynamic Grid System for Location Based Services |
PDF
![]() |
Rupa Debnath, G. Senthil Velan | 195-199 |
Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage |
PDF
![]() |
S. Nalini Poornima, Dr. R. S. Ponmagal | 200-204 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616