Journal Publications

International Journal of Advances in Computer Networks and Its Security

(14) Papers Found

The Significant of Character’s Location in the Authentication Process

Author(s) : KRANOGWAN KRASAESAT   , PATTARASINEE BHATTARAKOSOL   

No of Author(s) : 2
Page(s) : 1 - 5
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 371   |   Download(s) : 208

Post-Disaster Resource Management using Peer-to-Peer Opportunistic Networks

Author(s) : DEBANJAN DAS DEB   , SOMPRAKASH BANDYOPADHYAY   

No of Author(s) : 2
Page(s) : 6 - 10
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 478   |   Download(s) : 112

Performance Analysis of On-Demand Routing Protocols in Mobile Ad-Hoc Networks

Author(s) : MAJID AHMADI   , SHERVIN ERFANI   , SOKE ONYEMELUKWE   

No of Author(s) : 3
Page(s) : 11 - 14
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 456   |   Download(s) : 153

Effect of Using Different QoS Parameters in Performance of AODV, DSR, DSDV and OLSR Routing Protocols In MANET

Author(s) : AYOOB A.AYOOB   , GHAIDAA M. ABDULSAHIB   , MUAMER N. MOHAMMED   , NORROZILA SULAIMAN   , OSAMAH I. KHALAF   

No of Author(s) : 5
Page(s) : 15 - 19
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 548   |   Download(s) : 148

A Physical Measurement-Based Sybil Nodes Detection Mechanism in VANETs

Author(s) : DONGXU JIN    , FEI SHI    , JOOSEOK SONG

No of Author(s) : 3
Page(s) : 20-25
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 434   |   Download(s) : 178

A RFID yoking proof protocol to preserve an offline verification using the commitment disclosure

Author(s) : HYOUNGMIN HAM    , JOOSEOK SONG

No of Author(s) : 2
Page(s) : 26 - 30
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 468   |   Download(s) : 179

Classification of Clustering Schemes in VANETs

Author(s) : INHWAN KIM    , JOOSEOK SONG

No of Author(s) : 2
Page(s) : 31 - 34
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 474   |   Download(s) : 136

Security Network with Virtual Private Network & (IPSec) Applications

Author(s) : AHMED A. SABEEH  , DHARI KH ABEDULA   

No of Author(s) : 2
Page(s) : 35 - 40
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 493   |   Download(s) : 200

Comparison of Routing protocols in VANET scenarios

Author(s) : P.GEETHARANI

No of Author(s) : 1
Page(s) : 41 - 44
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 492   |   Download(s) : 155

Cloud Computing Security Issues and Measures

Author(s) : ANIRUDDHA S. RUMALE   , DINESH N. CHAUDHARI   

No of Author(s) : 2
Page(s) : 45 - 50
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 442   |   Download(s) : 154

Bandwidth and Delay Guaranteed Unicast Routing in Mobile Ad hoc Networks using Fuzzy Logic

Author(s) : MAMATA J. SATARADDI  , VIJAYASHREE R. BUDYAL   

No of Author(s) : 2
Page(s) : 51 - 55
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 384   |   Download(s) : 195

Different routing protocols and Their vulnerabilities and their Measures

Author(s) : HIMADRI NATH SAHA   , BIPASHA BANERJEE  , DEBIKA BHATTACHARYYA   , DEBOPAM GHOSH   , ROHIT SINGH   , SULAGNA MUKHERJEE   

No of Author(s) : 6
Page(s) : 56 - 66
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 457   |   Download(s) : 210

A Comparative Study of VoIP, MCS, Instant Messaging Protocols and Multimedia Applications

Author(s) : HADEEL SALEH HAJ ALIWI   , PUTRA SUMARI   

No of Author(s) : 2
Page(s) : 67 - 70
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 432   |   Download(s) : 159

Defensive Programming to Reduce PHP Vulnerabilities

Author(s) : DEEPAK SINGH TOMAR, DIVYA RISHI SAHU

No of Author(s) : 2
Page(s) : 71 - 75
Electronic ISSN : 2250 - 3757
Volume 4 : Issue 2
Views : 467   |   Download(s) : 156