1 |
Volume 7 |
Issue 2 |
High Secure Data Embedding Using Steganography And Cryptography |
P.JEYALAKSHMI, Mr.R.SANKAR |
|
2 |
Volume 7 |
Issue 2 |
Enabling Public Audit ability and Data Dynamics for Storage Security in Cloud Computing |
T. Sumadhi and M. Hemalatha |
|
3 |
Volume 7 |
Issue 2 |
A Novel Approach In Singlerate And Multirate Capability Of Optimal Anypath Routing In Wireless Multihop Networks |
Mr. Denny.P.George1, P.G Scholar, Mr. Sebastian Terence J |
|
4 |
Volume 7 |
Issue 2 |
Zone Based Transmission In Manets |
A.KANNAMMAL ANNIE BRUNETTE |
|
5 |
Volume 7 |
Issue 2 |
Performance Analysis of Routing Protocols In Mobile Ad Hoc Network |
S.Sumathi |
|
6 |
Volume 7 |
Issue 2 |
Computational Hybrids Towards Software Defect Prediction s |
Jasmine P |
|