Analysis of Authentication Protocols in Mobile IP |
Lalit Kumar |
Vol 11 (2014), Pagination: 1-6
|
ABSTRACT |
PDF
|
|
Abstract Views: 287 |
PDF Views: 5
|
A Survey on the Routing Protocols in Vanet |
Sanjay Bhatnagar |
Vol 11 (2014), Pagination: 7-10
|
ABSTRACT |
PDF
|
|
Abstract Views: 290 |
PDF Views: 4
|
Cutting back the Wormhole Attack in Mobile Network: A Survey |
Ramandeep Kaur, Anita, Abhilasha |
Vol 11 (2014), Pagination: 11-17
|
ABSTRACT |
PDF
|
|
Abstract Views: 279 |
PDF Views: 1
|
Network Security: Present and Future Trends |
Anand Chopra, Jaswinder Singh Walia, Lalit Kumar |
Vol 11 (2014), Pagination: 18-22
|
ABSTRACT |
PDF
|
|
Abstract Views: 281 |
PDF Views: 0
|
Juxtaposition between Cloud Computing and Grid Computing |
Gurpreet Kaur, Sanjay Bhatnagar, Deepali |
Vol 11 (2014), Pagination: 23-28
|
ABSTRACT |
PDF
|
|
Abstract Views: 371 |
PDF Views: 1
|
Optimization of Speed Protocol Using Genetic Algorithm in Wireless Sensor Network |
Gaganpreet Kaur, Abhilasha |
Vol 11 (2014), Pagination: 41-47
|
ABSTRACT |
PDF
|
|
Abstract Views: 294 |
PDF Views: 0
|
Novel Technique of Extraction of Principal Situational Factors for NSSA |
Pardeep Bhandari |
Vol 11 (2014), Pagination: 48-57
|
ABSTRACT |
PDF
|
|
Abstract Views: 292 |
PDF Views: 0
|
Tracking of Hand Movements in Gesture Recognition a Review on Techniques and Approaches |
Prerna Gupta, Garima Joshi, Maitreyee Dutta |
Vol 11 (2014), Pagination: 57-60
|
ABSTRACT |
PDF
|
|
Abstract Views: 271 |
PDF Views: 0
|
Optimization of Wireless Sensor Network Using PSO Algorithm |
Shubhdeep Kaur, Jagmeet Singh |
Vol 11 (2014), Pagination: 61-67
|
ABSTRACT |
PDF
|
|
Abstract Views: 289 |
PDF Views: 2
|
Network Authentication Encryption Protocol Based on Kerberos: A Review |
Davinderpreet Kaur, Brahmaleen Kaur |
Vol 11 (2014), Pagination: 68-72
|
ABSTRACT |
PDF
|
|
Abstract Views: 286 |
PDF Views: 0
|
Review On Various LEACH Variants |
Rupendra Ralhan, Sandeep Singh Waraich |
Vol 11 (2014), Pagination: 73-78
|
ABSTRACT |
PDF
|
|
Abstract Views: 283 |
PDF Views: 0
|
Performance Optimization in Geographical Based Routing Protocol in MANETS |
Vikas Goyal, Shaveta Rani, Paramjit Singh |
Vol 11 (2014), Pagination: 79-86
|
ABSTRACT |
PDF
|
|
Abstract Views: 259 |
PDF Views: 0
|
Analyzing Load and Delay in Wireless LAN using TTL and Fragmentation |
Jashanpreet Kaur, Vaneet Mohan, Namisha Modi |
Vol 11 (2014), Pagination: 86-90
|
ABSTRACT |
PDF
|
|
Abstract Views: 281 |
PDF Views: 0
|
Survey of various Active Attacks in MANETS |
Meena Bharti, Shaveta Rani, Paramjeet Singh |
Vol 11 (2014), Pagination: 91-95
|
ABSTRACT |
PDF
|
|
Abstract Views: 276 |
PDF Views: 0
|
LEACH Hierarchical Protocol Based on ACO and BCO |
Rishu Singla, Dinesh Kumar |
Vol 11 (2014), Pagination: 96-101
|
ABSTRACT |
PDF
|
|
Abstract Views: 259 |
PDF Views: 0
|
Optimized Packet Filtering Honeypot with Intrusion Detection System for WLAN |
Amandeep Singh, Pankush Singla, Navdeep Kaur Khiva |
Vol 11 (2014), Pagination: 101-106
|
ABSTRACT |
PDF
|
|
Abstract Views: 282 |
PDF Views: 3
|
Review of WiMax Services and Security Threats |
Vidhu Kiran Sharma, Shaveta Rani |
Vol 11 (2014), Pagination: 107-112
|
ABSTRACT |
PDF
|
|
Abstract Views: 259 |
PDF Views: 4
|
Virtual Energy Based Encryption Keying framework for WSN: A Survey |
Sukhjinder Kaur |
Vol 11 (2014), Pagination: 113-117
|
ABSTRACT |
PDF
|
|
Abstract Views: 280 |
PDF Views: 0
|
Review of Privacy Preserving Architectures in Cloud Computing |
Navdeep Kaur Khiva, Amandeep Singh, Pankush Singla |
Vol 11 (2014), Pagination: 118-126
|
ABSTRACT |
PDF
|
|
Abstract Views: 298 |
PDF Views: 6
|
Comprehensive Study and Review Various Routing Protocols in MANET |
Prabhjot Kaur, Preet Bala, Shaveta Rani |
Vol 11 (2014), Pagination: 126-131
|
ABSTRACT |
PDF
|
|
Abstract Views: 272 |
PDF Views: 0
|