© Copyright IAET USA |
1. |
Taming Enactment using Neighbor Discover Distance against Masquerading Attack in MANET |
Shalini.A, Arulkumaran.G, Srisathya.K.B | 1-6 |
2. |
Implementation of Boolean Circuits using DNA Computing |
Ashish Lamaniya, Brajesh Patel | 7-13 |
3. |
Fully Homomorphic Encryption Based Multiparty Association Rule Mining |
Priyanka Dubey, Roshani Dubey | 14-17 |
4. |
Intelligence with Li-Fi Technology |
C. Sridharan, P. Srikanth, J. R. Thresphine | 18-24 |
5. |
Location Sensitive Service Discovery Protocol For Mobility Support in Ubiquitous Computing Environment |
Sunil Kumar Nandal, Yogesh Chaba | 25-30 |
6. |
Spatial Desynchronization in Image Steganography |
Aakanksha Upadhyaya, Brajesh Patel | 31-36 |
7. |
Supporting Cooperative Caching in Ad Hoc Networks |
SathyaPriya. K, Thresphine. J. R | 37-40 |
8. |
Condense Clock Skew in Routing Integrated Time Synchronization with SPR in WSN |
V. Vimala, Kathirvel. A, T. Krishnaveni | 41-46 |