logo

Vol. 2, No.2, August 2012

Back to previous page

 

Serial #
Title
Page

001

A Review of Security Issues in Mobile Adhoc Networks

60-65
Author: Puneet Rai, Sanjeev Gupta, Anurag Malik

002

SETI@HOME: Application of Grid Computing—A Survey

66-69
Author: Sunil Kumar, Hari Shanker, Navase Ali

003

Authentication and Key Management in Wireless Mesh Network

70-74
Author: Shweta Agarwal, Neha Gupta

004

Secure Cloud Computing through IT Auditing

75-79
Author: Navita Agarwal

005

Survey and Analysis of DREAM Protocol in the Vehicular Ad-Hoc Network

80-84
Author: Manoj Kumar Singh, Anil Kumar Singh, Brajesh Kumar

006

Selection of Relevant Feature for Intrusion Attack Classification by Analyzing KDD Cup 99

85-90
Author: Prof. N.S. Chandolikar, Prof. (Dr.) V.D. Nandavadekar

007

Ontology Design and Quality Evaluation in Semantic Web

91-96
Author: Kavita Chaudhary, Anurag Malik

008

Copyright Protection and Multimedia Security for Video Using Digital Watermarking

97-101
Author: Sarita Chaudhary

 

 

Copyright 2010 All Rights Reserved.