Vol 8, No 5 (2016)

Table of Contents

Vol 8, No 5 (2016)

Open Access Open Access  Restricted Access Subscription Access

Articles

A Secure - Acknowledgment Based Detection Approach for MANET’S
V. Sathya
 Vol 8, No 5 (2016), Pagination: 153-162
ABSTRACT |  PDF     Abstract Views: 146  |  PDF Views: 0
A Study on Various Cryptographic Algorithms and their Scope and Improvement towards Future Security Needs
K. Gayathri, S. Sivachandiran
 Vol 8, No 5 (2016), Pagination: 163-167
ABSTRACT |  PDF     Abstract Views: 154  |  PDF Views: 0
Protection against Network Infection, Modeling and Restraining Network Using Malware Propagation Technique
M. Sudha, Neelima Jhavar
 Vol 8, No 5 (2016), Pagination: 168-172
ABSTRACT |  PDF     Abstract Views: 128  |  PDF Views: 0
Implementation of Optimized Clustering using Genetic Algorithm in Wireless Sensor Network
P. Jenis, P. K. Poonguzhali, M. Jeeva Jebakani
 Vol 8, No 5 (2016), Pagination: 173-175
ABSTRACT |  PDF     Abstract Views: 151  |  PDF Views: 0
Security Using RSA Algorithm in Opportunistic Localization for Underwater Sensor Networks
P. Vijayalakshmi, S. B. Saritha
 Vol 8, No 5 (2016), Pagination: 176-179
ABSTRACT |  PDF     Abstract Views: 146  |  PDF Views: 0
A Study on Authentication Challenges & Approaches
C. Subramanian, S. Stephen Raj
 Vol 8, No 5 (2016), Pagination: 180-182
ABSTRACT |  PDF     Abstract Views: 155  |  PDF Views: 2
Securing Digital Evidence from Tampering and Falsification using Cryptography and Steganography
K. Saranya, P. Kavitha
 Vol 8, No 5 (2016), Pagination: 183-186
ABSTRACT |  PDF     Abstract Views: 135  |  PDF Views: 2
Effective Energy Saving Strategy for Wireless Access Network Using Software Defined Network
T. K. Ujina, Sai Shanmuga Raja
 Vol 8, No 5 (2016), Pagination: 187-191
ABSTRACT |  PDF     Abstract Views: 146  |  PDF Views: 2
A Study on Innovative Testing Techniques
S. Somasundaram
 Vol 8, No 5 (2016), Pagination: 192-194
ABSTRACT |  PDF     Abstract Views: 144  |  PDF Views: 4
Semi Trusted Third Party Using Dynamic Grid System for Location Based Services
Rupa Debnath, G. Senthil Velan
 Vol 8, No 5 (2016), Pagination: 195-199
ABSTRACT |  PDF     Abstract Views: 147  |  PDF Views: 2
Secure Preserving Public Auditing for Regenerating Code based on Cloud Storage
S. Nalini Poornima, R. S. Ponmagal
 Vol 8, No 5 (2016), Pagination: 200-204
ABSTRACT |  PDF     Abstract Views: 132  |  PDF Views: 4