Table of Contents
Vol 1, No 5 (2010)
Articles
Customized PKI for SCADA System | ||
Anupam Saxena, Om Pal, Zia Saquib, Dhiren Patel | ||
Vol 1, No 5 (2010), Pagination: 282-289 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 259 | PDF Views: 0 |
Design and Modeling Billing Solution to Next Generation Networks | ||
Kamaljit I. Lakhtaria, N. N. Jani | ||
Vol 1, No 5 (2010), Pagination: 290-294 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 282 | PDF Views: 0 |
Design and Implementation of a Two Level Scheduler for HADOOP Data Grids | ||
G. Sudha Sadhasivam, M. Anjali | ||
Vol 1, No 5 (2010), Pagination: 295-300 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 262 | PDF Views: 0 |
Fuzzy Based Approach for Packet Dropping in Wireless Networks | ||
J. D. Mallapur, S. S. Manvi, D. H. Rao | ||
Vol 1, No 5 (2010), Pagination: 301-306 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 277 | PDF Views: 0 |
Virtual Market Using Logistics Optimization | ||
Reddy Veera Babu, M. Venkata Rao | ||
Vol 1, No 5 (2010), Pagination: 307-313 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 237 | PDF Views: 0 |
Performance Analysis of Internal vs. External Security Mechanism in Web Applications | ||
Supriya Gupta, Lalitsen Sharma | ||
Vol 1, No 5 (2010), Pagination: 314-317 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 249 | PDF Views: 0 |
Perceptual Metrics Watermarking-An Effective Algorithm with Retrieval Systems | ||
Rekha B. Venkatapur, V. D. Mytri, A. Damodaram | ||
Vol 1, No 5 (2010), Pagination: 318-322 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 263 | PDF Views: 0 |
A Montgomery Representation of Elements in GF(25) for Efficient Arithmetic to Use in Elliptic Curve Cryptography | ||
A. R. Rishivarman, B. Parthasarathy, M. Thiagarajan | ||
Vol 1, No 5 (2010), Pagination: 323-326 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 334 | PDF Views: 0 |
A Secure Key Agreement Protocol Using Braid Groups | ||
Atul Chaturvedi, Shyam Sundar | ||
Vol 1, No 5 (2010), Pagination: 327-330 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 308 | PDF Views: 0 |
Performance Modeling in Client Server Network Comparison of Hub, Switch and Bluetooth Technology Using Markov Algorithm and Queuing Petri Nets with the Security of Steganography | ||
V. B. Kirubanand, S. Palaniammal | ||
Vol 1, No 5 (2010), Pagination: 331-336 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 252 | PDF Views: 0 |
Design and Analysis of a 2D-Photonic Crystal Fiber Structure with Ultra-Flattened Dispersion and Single Mode Operation Over a Wide Range of Wavelength | ||
Sandhir K. Singh, Dharmendra K. Singh, P. Mahto | ||
Vol 1, No 5 (2010), Pagination: 337-340 | ||
ABSTRACT |
PDF
![]() |
Abstract Views: 279 | PDF Views: 0 |