Regular Issue |
S.No. |
Research Topic |
Pages |
1 |
Classified Information Preventing From Interference Attacks On Social Networks
G.Saraswathy and K.Kanchana |
1-15 |
2 |
Enhancing Security In Medical Image Communication Using Digital Signature
P. Antony raj and A. Umamageswari |
16-21 |
3 |
Near Field Communication Based Security Through Conditional Privacy Sequence Methodology
D.Prabakaran and M. Indira Kumar |
22-28 |
4 |
Study On Aggregation Based Trusted Routing Scheme For WSN
Kalaiarasi.M and Velmurugan.N |
29-33 |
5 |
Energy Efficient Sleep Scheduling With Qos Consideration In Next Generation Wireless Networks
A. Kalyanasundaram and S. Radhakrishnan |
34-39 |
6 |
Achieving Higher Network Security By Preventing Ddos Attacks Using Honeypot
H.C.Parimala and Kavitha Balamurugan |
40-45 |
7 |
Highly Secure Secret or Code Transform By Combination Of Steganography & Encryption Technique Using Socket Communication
Harilakshmi.M and Arul flora .T.G |
46-50 |
8 |
Multiple Sensor Applications Using Secure Data Aggregation
S.M.Bharathi and D. Durai Kumar |
51-58 |
9 |
Detection of Multiple Selfish Secondary Users In Cognitive Radio Network Using CRV
Ajantha.M and Suresh Kumar. P |
59-65 |
10 |
Secure Probabilistic Location Verification For Wireless Sensor Networks
R.Vidhyalakshmi and G.Surya |
66-68 |
11 |
Hierarchical Normalized Cut Method For Cancer Image Segmentation
Manochithra.P and Latha Shunmugam.D |
69-73 |
12 |
A Novel Algorithm For Extractingthe Features of Lesions From Mammogram Using Modified Expectation And Maximization
Sushree Prajnabasini Pani and V. Vedanarayanan |
74-77 |