Issue | Title | |
Vol 6, No 5 (2014) | Data Security and Privacy in Cloud Using RC6 and SHA Algorithms | Abstract |
O.M. Soundararajan, Y. Jenifer, S. Dhivya, T.K.P. Rajagopal | ||
Vol 9, No 9 (2017) | Data Security in System Socket Layer | Abstract |
K. Aiswarya, C. Bhuvaneswari, R. Sowmiya | ||
Vol 3, No 10 (2011) | Data Security Risks and Solutions in Cloud Computing | Abstract |
K. Vasantha Kokilam, S. Samson Dinakaran | ||
Vol 5, No 7 (2013) | Data Sharing Accountability in Cloud | Abstract |
S. Arul Murugan, M.A. Bhagyaveni, A.K.P. Kovendan | ||
Vol 3, No 15 (2011) | Data Storage on Clients for Implementation of Network RAID | Abstract |
Ankit Parekh, Anuya Welling, Pallak Jhawar, Pratik Munot, Amit Savyanavar | ||
Vol 6, No 7 (2014) | Database Migration along with Architecture using Bee Colony Optimization | Abstract |
Amarjit Kaur, Usvir Kaur, Dr. Dheerendra Singh | ||
Vol 5, No 3 (2013) | DDoS Attacks Detection and Trace Back the System | Abstract |
D. Delhi Ganesh | ||
Vol 3, No 9 (2011) | DDOS( Distributed Denial of Services) Attack and its Removal | Abstract |
Gaurav Mittal, Sheenam Goyal | ||
Vol 4, No 8 (2012) | Decoupling IPv7 from the World Wide Web in Reinforcement Learning | Abstract |
A.C. Reddy Sagar, G.M. Chanakya, S. Shiva Prakash | ||
Vol 10, No 3 (2018) | Decoupling the Ethernet from Systems in Consistent Hashing | Abstract |
J. Vinothkumar | ||
Vol 10, No 3 (2018) | Dedicated Automotive Network Design Using Zigbee for V2V | Abstract |
V. Gomathy, S. Sheeba Rani | ||
Vol 8, No 6 (2016) | Delay Tolerant Networking (DTN) Protocols for Space Communications | Abstract |
K. Ranjani, K. Sagadevan | ||
Vol 6, No 2 (2014) | Density Based Traffic Signal System Using Computer Vision | Abstract |
K. Vidhya, D. Anandhavalli | ||
Vol 4, No 10 (2012): Regular Issue | Deploying Application in Cloud Environment with Multi Level Authentication and Disaster Recovery | Abstract |
Pradeep Gurunathan, Dr. Seethalakshmi Pandian, Arjun Murali, Mullainathan Subramanian | ||
Vol 2, No 11 (2010) | Deploying Modified Hash Based Message Authentication Code HMAC in MATLAB Using GUI Controls | Abstract |
B. Sridevi, Dr.S. Rajaram | ||
Vol 2, No 3 (2010) | Design & Analysis of Wireless Network for Signaling and Safety in Railways | Abstract |
Achintya Jain, Ashish Tiwari, M. Jasmin Pemeena Priyadarshini, Dr.S.K. Sudheer | ||
Vol 3, No 10 (2011) | Design & Implementation of Network Protocol Analyzer for Monitoring Network Traffic | Abstract |
Shailendra M. Pardeshi, Dr.A.S. Umesh, Pratibhadevi Umesh | ||
Vol 13, No 5 (2021) | Design and Development of IOT Based Robot Vehicle for Border Security | Abstract |
H. S. Rohith, H. K. Shilpa, M. Sindhu, V. Srinivasan | ||
Vol 1, No 5 (2009) | Design and Implementation of a Novel Cryptographic Mail Composer | Abstract |
S. N. Sivanandam, P. Visalakshi, S. Balamurugan | ||
Vol 4, No 10 (2012): Special Issue | Design and Implementation of a Novel Energy Efficient Multicast Routing Protocol for MANETs | Abstract |
Kamal Kamal, J. Janet | ||
Vol 3, No 10 (2011) | Design and Implementation of Flexible Adaptive Viterbi Decoder on FPGA | Abstract |
S.V. Viraktamath, Dr.G.V. Attimarad, Prakash R. Tonse | ||
Vol 4, No 13 (2012) | Design and Implementation of GPRS Based Telemedicine System for Remote Patient Monitoring | Abstract |
Divyang D. Vyas, Dr.H.N. Pandya | ||
Vol 3, No 12 (2011) | Design and Implementation of Microstrip Patch Antenna for Wireless LAN | Abstract |
A. Sahaya Anselin Nisha, T. Jayanthy | ||
Vol 2, No 11 (2010) | Design and Optimization of Multi-Band 3.1-4.8GHz VCO for UWB Communication System | Abstract |
D. Ben Issa, M. Samet, A. Kachouri | ||
Vol 3, No 15 (2011) | Design and Optimization via Graphical Optimization Method of an Injection-Locked Frequency Divider in 0.35 µm Process | Abstract |
T. Chtioui, D. Ben Issa, A. Fakhfakh, M. Samet | ||
351 - 375 of 963 Items | << < 10 11 12 13 14 15 16 17 18 19 > >> |
ISSN: 0974 – 9616