

Table of Contents
Articles
Cluster-Based License Revocation with Vindication Ability for Mobile Ad Hoc Networks |
PDF
![]() |
S. Jagadeesan | 173-179 |
Mobile Phone Cloning and Computing |
PDF
![]() |
M. Monisha, S. Sivachandiran | 180-184 |
Key Management Schemes in Wireless Sensor Networks: A Survey |
PDF
![]() |
R Vijaya Saraswathi, L Padma Sree, K. Anuradha | 185-190 |
Performance Evaluation of Wireless Mesh Network (IEEE 802.11s) |
PDF
![]() |
Shallu Singh, Kiran Ahuja | 191-195 |
LERMP: A Secure Location Based Efficient Multipath Routing Protocol |
PDF
![]() |
Rajan Gandhi, Dr. Prasanna Joeg | 196-201 |
Secure and Scalable Sensor Data Access Network with Delay Tolerance |
PDF
![]() |
P. Saranya, Dr. R. S. Ponmagal | 202-206 |
Isolation of Malevolent Nodes using Supportive Trap in Mobile Adhoc Networks |
PDF
![]() |
C. Sangami, T.V. Ananthan, S. Shruthi | 207-210 |
Securing Smart Grid Communication against False Data Injection Attacks |
PDF
![]() |
A. Anandhi, Dr. G. Kalpana | 211-215 |
Key Metrics for Safeguarding Confidential Data in Cloud |
PDF
![]() |
L. Karthikeyan, G. Sreeram | 216-218 |
Virtual Localization of Mobile Robot in Simulink and Hardware Interfacing |
PDF
![]() |
M.C. Harish Bharath, G. Kalaiarassan | 219-225 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9640