![Open Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://ciitresearch.org/dl/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Table of Contents
Articles
Analysis of Different Parameters of ZigBee (802.15.4) for Wireless Sensor Networks |
PDF
![]() |
Gagninder Kaur, Raveenpal Kaur | 143-147 |
Effective Replica Allocation to Minimize Performance Degradation in MANET |
PDF
![]() |
P. Nagasundari, M. Malathi | 148-153 |
An Efficient Identification of Malicious Packet Dropping In Wireless Sensor Networks |
PDF
![]() |
A.S. Hemavarthinee, T.R. Vedhavathy, M. Bakyalakshmi | 154-157 |
QoS Provisioning in Vertical Handover of WiMAX/WLAN Overlay Network for Fixed and Mobile Users |
PDF
![]() |
G. Ben Seraphin, S. Ramesh | 158-162 |
Versioning File System in Cloud Computing with Intrusion Detection using Mobile Agent |
PDF
![]() |
V. Arun, Dr. K.L Shunmuganathan | 163-169 |
TARF-Prevention from Adverseries of Multihop Routing in WSN |
PDF
![]() |
Aathira Jayan, K. Divya, R. Divya, R. Geetha | 170-176 |
Cost Optimized Resource Provisioning in Cloud Computing Environments |
PDF
![]() |
P. Arun Pandian, S. Anto | 177-182 |
Trusted Third Party Auditing to Improve the Cloud Storage Security |
PDF
![]() |
V. Venkatesh, P. Parthasarathi | 183-187 |
Enabling Data Storage Security by Multiple Auditing Mechanism in Cloud Computing |
PDF
![]() |
B. Santhosh, M. Suguna | 188-194 |
![Creative Commons License](http://i.creativecommons.org/l/by/3.0/80x15.png)
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640