Vol 5, No 8 (2013)

Table of Contents

Vol 5, No 8 (2013)

Open Access Open Access  Restricted Access Subscription Access

Articles

Fault Forbearance Methods for Randomized Intrusion Tolerance
R. Vikkram, M. Sathya Prasath, R. Vidhyalakshmi
 Vol 5, No 8 (2013), Pagination: 379-382
ABSTRACT |  PDF     Abstract Views: 186  |  PDF Views: 3
Analysis and Implementation of Optimized Image Encryption Algorithm Using Bhramgupta-Bhaskara Equation
Sanjay Chaudhari, Deepak Dembla
 Vol 5, No 8 (2013), Pagination: 383-388
ABSTRACT |  PDF     Abstract Views: 180  |  PDF Views: 2
Implementation of EESCP Protocol in Mobile Adhoc Networks
P. Paruthi Ilam Vazhuthi, S. Parthiban, V. Thiyagarajan
 Vol 5, No 8 (2013), Pagination: 389-394
ABSTRACT |  PDF     Abstract Views: 163  |  PDF Views: 2
Dynamic and Secure Ranked Keyword Search in Cloud with Authenticity
G. Sankareeswari, C. Jeganathan
 Vol 5, No 8 (2013), Pagination: 395-401
ABSTRACT |  PDF     Abstract Views: 163  |  PDF Views: 2
Implement to Increase the Safety of Railway Vehicles with Real Time Warning Facility
Tarun Dhar Diwan, Shikha Mishra, Shubhra Tiwari
 Vol 5, No 8 (2013), Pagination: 402-406
ABSTRACT |  PDF     Abstract Views: 183  |  PDF Views: 2
Dynamic Job and Resource Grouping-Based Scheduling in Grid Computing
P. Ashok
 Vol 5, No 8 (2013), Pagination: 407-411
ABSTRACT |  PDF     Abstract Views: 170  |  PDF Views: 2
Methods of Reducing False Alerts by Intrusion Detection System
Prajakta Sandeep Jadhav
 Vol 5, No 8 (2013), Pagination: 412-416
ABSTRACT |  PDF     Abstract Views: 169  |  PDF Views: 2