Table of Contents
Vol 8, No 5 (2016)


Articles
A Secure - Acknowledgment Based Detection Approach for MANET’S | ||
V. Sathya | ||
Vol 8, No 5 (2016), Pagination: 153-162 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 324 | PDF Views: 0 |
A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs | ||
K. Gayathri, S. Sivachandiran | ||
Vol 8, No 5 (2016), Pagination: 163-167 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 307 | PDF Views: 0 |
Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique | ||
M. Sudha, Neelima Jhavar | ||
Vol 8, No 5 (2016), Pagination: 168-172 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 275 | PDF Views: 0 |
Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network | ||
P. Jenis, P. K. Poonguzhali, M. Jeeva Jebakani | ||
Vol 8, No 5 (2016), Pagination: 173-175 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 318 | PDF Views: 0 |
Security Using RSA Algorithm in Opportunistic Localization for Underwater Sensor Networks | ||
P. Vijayalakshmi, S. B. Saritha | ||
Vol 8, No 5 (2016), Pagination: 176-179 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 325 | PDF Views: 0 |
A Study on Authentication Challenges & Approaches | ||
C. Subramanian, S. Stephen Raj | ||
Vol 8, No 5 (2016), Pagination: 180-182 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 308 | PDF Views: 2 |
Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography | ||
K. Saranya, P. Kavitha | ||
Vol 8, No 5 (2016), Pagination: 183-186 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 301 | PDF Views: 2 |
Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network | ||
T. K. Ujina, Sai Shanmuga Raja | ||
Vol 8, No 5 (2016), Pagination: 187-191 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 296 | PDF Views: 2 |
A Study on Innovative Testing Techniques | ||
S. Somasundaram | ||
Vol 8, No 5 (2016), Pagination: 192-194 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 302 | PDF Views: 4 |
Semi Trusted Third Party Using Dynamic Grid System for Location Based Services | ||
Rupa Debnath, G. Senthil Velan | ||
Vol 8, No 5 (2016), Pagination: 195-199 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 322 | PDF Views: 2 |
Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage | ||
S. Nalini Poornima, R. S. Ponmagal | ||
Vol 8, No 5 (2016), Pagination: 200-204 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 293 | PDF Views: 4 |