| Issue | Title | |
| Vol 2, No 11 (2010) | Implementation and Investigation of AES, DES and Triple DES to Secure MPLS Network | Abstract |
| K. Gurpreet, K. Dinesh | ||
| Vol 11, No 4 (2019) | Implementation of DNA Cryptosystem Using Public and Private Key Cryptography | Abstract |
| Manoj Kumar Pandey, Preeti Tiwari | ||
| Vol 5, No 8 (2013) | Implementation of EESCP Protocol in Mobile Adhoc Networks | Abstract |
| P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan | ||
| Vol 8, No 4 (2016) | Implementation of High Speed Secure Communication Between Multiple FPGA Systems Using RTOS | Abstract |
| G. Snehalatha | ||
| Vol 2, No 3 (2010) | Implementation of Hybrid ARQ | Abstract |
| Meenal R. Majge, Achala M. Deshmukh | ||
| Vol 4, No 14 (2012) | Implementation of Layer Cluster Based Routing (LCR) using Ad hoc On-demand Multipath Distance Vector (AOMDV) | Abstract |
| N. Nithya, R. Maruthaveni | ||
| Vol 10, No 2 (2018) | Implementation of Optimised Power Sharing During Heavy Demands Energy Recording Cum Control System | Abstract |
| S. Vivek, Dr. G. Saravanakumar | ||
| Vol 8, No 5 (2016) | Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network | Abstract |
| P. Jenis, P.K. Poonguzhali, M. Jeeva Jebakani | ||
| Vol 2, No 10 (2010) | Implementation of Performance Evaluation Methodologies for the Ad-hoc On-Demand Distance Vector Routing Protocols | Abstract |
| Dr. Andhe Dharani, Chandra sekhar, Aniruddha Biswas | ||
| Vol 8, No 7 (2016) | Implementation of Reliable Routing to Prevent Inter Hop Verification in Wireless Sensor Network Using Onion Protocol | Abstract |
| G. Pradeepa, D. Nivedha, M. Nandini | ||
| Vol 1, No 8 (2009) | Implementation of Security Package for Data Integrity with Various Hash Algorithms | Abstract |
| B. Sridevi, Dr. N. SureshKumar | ||
| Vol 2, No 8 (2010) | Implementation of Semisoft Handover in Multicarrier Broadband Systems for Low and High Data Rates | Abstract |
| S. Balaji, N.V. Suneel Kumar, R. Santhakumar, T. Velmurugan, Tauseef Ahmed Shaik | ||
| Vol 6, No 7 (2014) | Implementation of TCP/IP using pSOS | Abstract |
| M. Meena | ||
| Vol 3, No 7 (2011) | Implementation of VoIP Using Session Initiation Protocol | Abstract |
| G. Appala Naidu, P. Chandrasekhar, K. Srinivas, Anwar Basha Pattan | ||
| Vol 1, No 3 (2009) | Implementation of WAP Gateway Technologies through Wireless Communication | Abstract |
| K. Muruganadam, R. Rajesh | ||
| Vol 3, No 5 (2011) | Implementation of XTEA in FPGA to Resolve the Attacks on TEA | Abstract |
| M. Manjupriya, S. Senthil Kumar | ||
| Vol 5, No 4 (2013) | Implementing ABSM Protocol for VANET | Abstract |
| M.S. Bagavathiammal, P. Sivaraman | ||
| Vol 4, No 8 (2012) | Implementing ACERL TCP in Wireless Environment using Adaptive Retransmission | Abstract |
| Ashwini A. Jewalikar, Amar R. Buchade | ||
| Vol 7, No 3 (2015) | Implementing the Information Security using Factors of Number | Abstract |
| Gopinath Mukherjee, Dr. Pranam Paul | ||
| Vol 7, No 2 (2015) | Implementing the Information Security Using Number System | Abstract |
| Moinak Chowdhury, Dr. Pranam Paul | ||
| Vol 4, No 3 (2012) | Implicit Password Authentication System | Abstract |
| A. Pandian, J. Venkatasubramanian, K. Balaji | ||
| Vol 2, No 9 (2010) | Importance of IDPF to Avoid DDoS Attacks | Abstract |
| CH. Srikar, K. Hanumantha Rao, K. Venkatesh Sharma | ||
| Vol 7, No 1 (2015) | Important Gene Selection Based on Gene Expression using Hopfield Network | Abstract |
| D. Chatterjee, A. Bandyopadhyay | ||
| Vol 7, No 5 (2015) | Improved Congestion Control for Packet Switched Networks and the Web Servers | Abstract |
| G. Thilip Kumar, Dr. R. Balasubramanian | ||
| Vol 4, No 9 (2012) | Improved Cryptography for Avoiding Data Frauds on Mobile Devices | Abstract |
| A. Sharmishta Desai | ||
| 526 - 550 of 963 Items | << < 17 18 19 20 21 22 23 24 25 26 > >> | |
ISSN: 0974 – 9616