Volume-1 , Issue-2 , Jun 2013, ISSN 2321-3256 (Electronic Version) Go Back
-
Open Access Article
Performance Comparison of Latency for RSC-RSC and RS-RSC Concatenated Codes
Manish Kumar and Jyoti Saxena
Research Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.1-4, Jun-2013
-
Open Access Article
Modelling and simulation of DDOS Attack using SimEvents
Abubakar Bala and Yahya Osais
Research Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.5-14, Jun-2013
-
Open Access Article
Cryptography Automata Based Key Generation
Harsh Bhasin and Neha Kathuria
Research Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.15-17, Jun-2013
-
Open Access Article
Review: Software Defined Networking and OpenFlow
Mandar B. Shinde, Sunil G. Tamhankar
Review Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.18-20, Jun-2013
-
Open Access Article
Modified Pairwise Key Pre-distribution Scheme with Deployment Knowledge in Wireless Sensor Network
Sanchita Gupta and Pooja Saini
Research Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.21-23, Jun-2013
-
Open Access Article
Microstrip Antenna Using Dummy EBG
Arpit Nagar, Aditya Singh Mandloi and Khem Singh Solanki
Research Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.24-28, Jun-2013
-
Open Access Article
Mulla Syed Musabbin Ahmed and Shalini
Technical Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.29-30, Jun-2013
-
Open Access Article
Bluetooth and Ad Hoc Networking
Poonam Ahuja
Review Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.31-34, Jun-2013
-
Open Access Article
V. Kapoor
Research Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.35-38, Jun-2013
-
Open Access Article
A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security
V. Kapoor
Research Paper | Journal (IJSRNSC)
Vol.1 , Issue.2 , pp.39-46, Jun-2013
Next Last |
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.