Volume-1 , Issue-2 , Jun 2013, ISSN 2321-3256 (Electronic Version) Go Back

  • Open Access   Article

    Performance Comparison of Latency for RSC-RSC and RS-RSC Concatenated Codes

    Manish Kumar and Jyoti Saxena

    Research Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.1-4, Jun-2013

  • Open Access   Article

    Modelling and simulation of DDOS Attack using SimEvents

    Abubakar Bala and Yahya Osais

    Research Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.5-14, Jun-2013

  • Open Access   Article

    Cryptography Automata Based Key Generation

    Harsh Bhasin and Neha Kathuria

    Research Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.15-17, Jun-2013

  • Open Access   Article

    Review: Software Defined Networking and OpenFlow

    Mandar B. Shinde, Sunil G. Tamhankar

    Review Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.18-20, Jun-2013

  • Open Access   Article

    Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network

    Sanchita Gupta and Pooja Saini

    Research Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.21-23, Jun-2013

  • Open Access   Article

    Microstrip Antenna Using Dummy EBG

    Arpit Nagar, Aditya Singh Mandloi and Khem Singh Solanki

    Research Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.24-28, Jun-2013

  • Open Access   Article

    Reconfigurable Hardware Implementation of Adaptive LMS algorithm for Noise Cancellation on Real-time Audio signals

    Mulla Syed Musabbin Ahmed and Shalini

    Technical Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.29-30, Jun-2013

  • Open Access   Article

    Bluetooth and Ad Hoc Networking

    Poonam Ahuja

    Review Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.31-34, Jun-2013

  • Open Access   Article

    Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number

    V. Kapoor

    Research Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.35-38, Jun-2013

  • Open Access   Article

    A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security

    V. Kapoor

    Research Paper | Journal (IJSRNSC)

    Vol.1 , Issue.2 , pp.39-46, Jun-2013

Next    Last   
Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation