Vol 6, No 5 (2014)

Table of Contents

Vol 6, No 5 (2014)

Open Access Open Access  Restricted Access Subscription Access

Articles

Setting Up Based Private Cloud Using Open Stack
D. Anish Nirmal, K. Arunkumar, V. Girish, R. Arunkumar
 Vol 6, No 5 (2014), Pagination: 177-182
ABSTRACT |  PDF     Abstract Views: 169  |  PDF Views: 2
Power Conservation Target Tracking in Sensor Network Using Sleep Scheduling
S. Sathis Kumar, A. Suresh Kumar
 Vol 6, No 5 (2014), Pagination: 183-187
ABSTRACT |  PDF     Abstract Views: 146  |  PDF Views: 3
SVM Based Network Traffic Classification Using Correlation Information
R. S. Anu Gowsalya, S. Miruna Joe Amali
 Vol 6, No 5 (2014), Pagination: 188-192
ABSTRACT |  PDF     Abstract Views: 213  |  PDF Views: 2
Review of MANET:Applications & Challenges
Manpreet Singh, Malti Sarangal, Gurpreet Singh
 Vol 6, No 5 (2014), Pagination: 193-197
ABSTRACT |  PDF     Abstract Views: 172  |  PDF Views: 2
Effective Privacy Preserving In Leakage Upper Bound Constraints Using Cloud
S. Hemalatha, S. Alaudeen Basha, N. Premkumar
 Vol 6, No 5 (2014), Pagination: 198-201
ABSTRACT |  PDF     Abstract Views: 158  |  PDF Views: 2
Data Security and Privacy in Cloud Using RC6 and SHA Algorithms
O. M. Soundararajan, Y. Jenifer, S. Dhivya, T. K. P. Rajagopal
 Vol 6, No 5 (2014), Pagination: 202-205
ABSTRACT |  PDF     Abstract Views: 197  |  PDF Views: 2
An Enhanced Security Algorithm for Data Transmission in Cloud Computing
P. Suganthi, E. Mahalakshmi
 Vol 6, No 5 (2014), Pagination: 206-209
ABSTRACT |  PDF     Abstract Views: 172  |  PDF Views: 2
Privacy-Preserving in Public Auditing for Secure Cloud
G. Balamurugan, S. Alaudeen Basha, T. Parthiban
 Vol 6, No 5 (2014), Pagination: 210-212
ABSTRACT |  PDF     Abstract Views: 182  |  PDF Views: 2
Prevention of Wormhole and Blackhole Attacks by Detecting Wormhole Nodes Using Countermeasure with AHP
A. Ayisha Parveen, M. Saithun Bushra, M. Islabudeen
 Vol 6, No 5 (2014), Pagination: 213-217
ABSTRACT |  PDF     Abstract Views: 157  |  PDF Views: 2