Browse Title Index


 
Issue Title
 
Vol 5, No 1 (2014): January-2014 An Overview and Survey of Various Cloud Simulation Tools Abstract   PDF2
Parveen Kumar, Anjandeep Kaur Rai
 
Vol 3, No 3 (2012): March-2012 AN OVERVIEW OF BLUETOOTH SECURITY: ISSUES AND CHALLENGES Abstract   PDF2
Nishant Mishra
 
Vol 3, No 5 (2012): May - 2012 AN OVERVIEW OF VARIOUS FORMS OF LINGUISTIC STEGANOGRAPHY AND THEIR APPLICATIONS IN PROTECTING DATA Abstract   PDF2
M. K. Kaleem
 
Vol 3, No 10 (2012): October 2012 AN OVERVIEW ON PHYSICAL IMPLEMENTATION OF SECURE ETL WORKFLOW Abstract   PDF2
Nitin Anand
 
November-2010 AN SCHEME TO TRANSMIT SECURE MESSAGE WITH AUTHENTICATION & INTEGRITY USING TRIPLE - EHDES Abstract   PDF
Ramveer Singh
 
Vol 3, No 9 (2012): September-2012 ANALYSIS AND ASSESSMENT OF SURFACE IMAGE TEXTURE MECHANISMS Abstract   PDF2
T.Venkat Narayana Rao
 
July-2011 ANALYSIS OF DDoS ATTACKS IN DISTRIBUTED PEER TO PEER NETWORKS Abstract   PDF
Vooka Pavan Kumar
 
Vol 3, No 3 (2012): March-2012 ANALYSIS OF DIFFERENT VULNERABILITIES IN AUTO TELLER MACHINE TRANSACTIONS Abstract   PDF2
Navneet Sharma
 
Vol 5, No 6 (2014): June-2014 Analysis of Issues in phishing attack and development of prevention mechanism Abstract   PDF2
Neelam Gupta
 
Vol 3, No 8 (2012): August-2012 Analysis of Lossless Reversible Transformation Algorithms to Enhance Data Compression Abstract   PDF2
Jeyanthi Perumal, Anuratha Vinodkumar
 
Vol 4, No 2 (2013): February-2013 ANALYSIS OF MITM ATTACK IN SECURE SIMPLE PAIRING Abstract   PDF2
Praveen Mishra
 
Vol 2, No 11 (2011): November 2011 ANALYSIS OF MOBILE AGENT Abstract   PDF
Prakash V. Rajguru, Dr. Sushant B. Deshmukh
 
Vol 3, No 11 (2012): November-2012 Analysis of Multipliers in VLSI Abstract   PDF2
Iffat Fatima
 
Vol 3, No 9 (2012): September-2012 ANALYSIS ON SUSPICIOUS THYROID RECOGNITION USING ASSOCIATION RULE MINING Abstract   PDF2
K. Saravana Kumar
 
July-2011 Analyzing the Superlative Symmetric Cryptographic Encryption Algorithm Abstract   PDF
Srinivasarao D
 
Vol 5, No 12 (2014): December-2014 AngularJS: A Modern MVC Framework in JavaScript Abstract   PDF2
Nilesh Jain, Dr. Ashok Bhansali, Deepak Mehta
 
May-2011 Anti-Random Test Generation In Software Testing Abstract   PDF
Kulvinder Singh, Seema Rani
 
Vol 3, No 1 (2012): January 2012 Application Based Selection Techniques for Web Services Mechanism Abstract   PDF
Deshraj Ahirwar
 
March-2011 APPLICATION BASED SEMANTIC WEB MINING TECHNIQUE Abstract   PDF
Mahindra Pratap Singh Dohare
 
July-2011 APPLICATION BASED UNDERSTANDING AND CLASSIFYING WEB QUIRES Abstract   PDF
Rajesh Kumar Ahirwar
 
Vol 3, No 3 (2012): March-2012 APPLICATION OF DECISION DIAGRAMS TO DESIGN QUANTUM LOGIC CIRCUITS Abstract   PDF2
Joyshree Nath
 
Vol 3, No 11 (2012): November-2012 APPLICATION OF FUZZY ERROR CORRECTION IN SOLVING SECURITY ISSUES IN ONLINE COMMUNICATION Abstract   PDF2
Akshay Kumar Tyagi
 
Vol 3, No 8 (2012): August-2012 APPLICATIONS OF ASSOCIATION RULE MINING IN DIFFERENT DATABASES Abstract   PDF2
Dr. M. Renuka Devi
 
Vol 3, No 8 (2012): August-2012 APPLICATIONS OF FUZZY ERROR CORRECTION IN COMMUNICATION SECURITY IN CRYPTOGRAPHY Abstract   PDF2
Akshay Kumar Tyagi
 
May-2011 Applications of Software Testing Metrics in Constructing Models of the Software Development Process Abstract   PDF
Vikas Verma
 
151 - 175 of 637 Items << < 2 3 4 5 6 7 8 9 10 11 > >>