Vol 7, No 6 (2015)

Table of Contents

Vol 7, No 6 (2015)

Open Access Open Access  Restricted Access Subscription Access

Articles

Design of 64x64 Bit Parity Preserving Reversible Vedic Multiplier Using Carry Look Ahead Adder
Akansha Sahu, Anil Kumar Sahu
 Vol 7, No 6 (2015), Pagination: 247-254
ABSTRACT |  PDF     Abstract Views: 139  |  PDF Views: 3
Secure Socket Layer and its Security Analysis
Deepika Bansal, Priya Sethi, Shipra Kataria
 Vol 7, No 6 (2015), Pagination: 255-259
ABSTRACT |  PDF     Abstract Views: 161  |  PDF Views: 4
DomainKeys Identified Mail
Shipra Kataria, Deepika Bansal, Priya  Sethi
 Vol 7, No 6 (2015), Pagination: 260-264
ABSTRACT |  PDF     Abstract Views: 160  |  PDF Views: 3
Visual Cryptography
Priya Sethi, Shipra Kataria, Deepika Bansal
 Vol 7, No 6 (2015), Pagination: 265-268
ABSTRACT |  PDF     Abstract Views: 160  |  PDF Views: 3
Performance Evaluation of AODV and DSDV Routing Protocols in Self Organizing Architecture
Ruby Bhagat, Nitika Chowdhary, Jyoteesh Malhotra
 Vol 7, No 6 (2015), Pagination: 269-272
ABSTRACT |  PDF     Abstract Views: 162  |  PDF Views: 3
An Efficient Transmission of Data in MANET using Position Based Opportunistic Routing Protocol
P. Kalaivani, S. Niveda, P. Nanthini
 Vol 7, No 6 (2015), Pagination: 273-275
ABSTRACT |  PDF     Abstract Views: 177  |  PDF Views: 3
Authenticated Anonymous Secure Routing for Mobile Adhoc Networks
K. Geetha Nandhini, A. Anu Priya, C. Kiruthika, B. Deepa
 Vol 7, No 6 (2015), Pagination: 276-279
ABSTRACT |  PDF     Abstract Views: 167  |  PDF Views: 3
HONEYPOT:Network Security
A. Dayana, S. Saranya, B. Geethamani, R. Kashturi
 Vol 7, No 6 (2015), Pagination: 280-282
ABSTRACT |  PDF     Abstract Views: 160  |  PDF Views: 3
Bilinear Aggregate Signature and PDP Encryption in Audit Service for Cloud Storage
B. Premkumar, R. S. Ponmagal
 Vol 7, No 6 (2015), Pagination: 283-286
ABSTRACT |  PDF     Abstract Views: 180  |  PDF Views: 2