- Manpreet Kaur, Rajni, Parminder Singh:
Performance Evaluation of V2VCommunication by Implementing Security Algorithm in VANET. ACITY (1) 2012: 757-763 - Amish Kumar, Namita Tiwari
:
Effective Implementation and Evaluation of AES in Matlab. ACITY (1) 2012: 95-101 - K. Anitha Kumari
, G. Sudha Sadasivam
, Bhandari Chetna, S. Rubika:
A Novel Triangle Centroid Authentication Protocol for Cloud Environment. ACITY (1) 2012: 245-254 - Moon Ho Lee, Md. Hashem Ali Khan, Daechul Park:
Jong Nang 3-Input NOR Channel, . ACITY (1) 2012: 551-562 - Premraj Mahajan, Anjali Sardana:
Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis. ACITY (1) 2012: 43-53 - P. R. Mahalingam
:
Intelligent Network-Based Intrusion Detection System (iNIDS). ACITY (1) 2012: 1-9 - Koushik Majumder
, Sudhabindu Ray, Subir Kumar Sarkar:
Hybrid Scenario Based Analysis of the Effect of Variable Node Speed on the Performance of DSDV and DSR. ACITY (1) 2012: 797-806 - Shanta Mandal, Rituparna Chaki:
A Novel Power Balanced Encryption Scheme for Secure Information Exchange in Wireless Sensor Networks. ACITY (1) 2012: 263-271 - Rakesh Matam, Somanath Tripathy
:
Reliability Enhanced Routing Protocol for Wireless Mesh Networks. ACITY (1) 2012: 587-596 - Monomita Mazumdar, Srimanta Halder, Prasenjit Chanak
, Indrajit Banerjee
:
DARIH: Distributed Adaptive Routing via Information Highway in Sensor Network. ACITY (1) 2012: 597-607 - Shivani Mishra, Krishna Kant, R. S. Yadav:
Multi Tree View of Complex Attack - Stuxnet. ACITY (1) 2012: 171-188 - Madhumita Mishra
, Somanath Tripathy
, Sathya Peri:
SEPastry: Security Enhanced Pastry. ACITY (1) 2012: 789-795 - Uttam Kr. Mondal
, Jyotsna Kumar Mandal
:
Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT). ACITY (1) 2012: 199-208 - Debajyoti Mukhopadhyay
, Sheetal Vij, Suyog Tasare:
NAAS: Negotiation Automation Architecture with Buyer's Behavior Pattern Prediction Component. ACITY (1) 2012: 425-434 - S. V. Nagaraj
:
Securing Multi-agent Systems: A Survey. ACITY (1) 2012: 23-30 - Nagesha
, Sunilkumar S. Manvi:
Performance Analysis of SCTP Compared to TCP and UDP. ACITY (1) 2012: 515-524 - Bukke Devendra Naik, Sarath Chandra Boddukolu, Pothula Sujatha
, P. Dhavachelvan:
Connecting Entropy-Based Detection Methods and Entropy to Detect Covert Timing Channels. ACITY (1) 2012: 279-288 - Utpal Nandi
, Jyotsna Kumar Mandal
:
Adaptive Region Based Huffman Compression Technique with Selective Code Interchanging. ACITY (1) 2012: 739-748 - Majid Nezakatolhoseini, Sam Jabbehdari
, Mohammad Ali Pourmina
:
Analysis and Performance Evaluation of Application Specific Processors for Network-Based Intrusion Detection Systems. ACITY (1) 2012: 61-70 - Aakanksha Pandey, Nilay Khare
:
String Matching Technique Based on Hardware: A Comparative Analysis. ACITY (1) 2012: 339-347 - Ahtesham Akhtar Patel, S. Jaya Nirmala
, S. Mary Saira Bhanu:
Security and Availability of Data in the Cloud. ACITY (1) 2012: 255-261 - Helly Patel, Mahesh P. Wankhade:
Human Tracking in Video Surveillance. ACITY (1) 2012: 749-756 - Tulsidas Patil, Ganesh Dattatray Bhutkar, Noshir Tarapore:
Usability Evaluation Using Specialized Heuristics with Qualitative Indicators for Intrusion Detection System. ACITY (1) 2012: 317-328 - Shailaja C. Patil
, Ashish Gupta, Mukesh A. Zaveri:
Efficient Target Recovery in Wireless Sensor Network. ACITY (1) 2012: 385-394 - Shailaja C. Patil
, Mukesh A. Zaveri:
Localization in Wireless Sensor Network: A Distributed Approach. ACITY (1) 2012: 467-476 - Lakshmi Priya, Meenakshi Murugappan
, G. Geetha:
Design of Broadband Optical Sources for OCDMA/WDMA Applications. ACITY (1) 2012: 457-466 - K. Rahimunnisa, M. Priya Zach, S. Suresh Kumar, J. Jayakumar:
Efficient Techniques for the Implementation of AES SubByte and MixColumn Transformations. ACITY (1) 2012: 497-506 - B. Siva Kumar Reddy, M. Sakthi Ganesh
, P. Venkata Krishna
:
Temporary Parallel Route Recovery for Frequent Link Failure in VANET. ACITY (1) 2012: 369-374 - Sarbani Roy
, Nandini Mukherjee:
Topology Construction of 3D Wireless Sensor Network. ACITY (1) 2012: 533-542 - Tumpa Roy, Poonam Sisodia, Divye Upadhyay, Kamlesh Dutta:
Mutual Authentication for Wireless Communication Using Elliptic Curve Digital Signature Based on Pre-known Password. ACITY (1) 2012: 11-22