International Journal of Information & Computation Technology (IJICT)

 

Volume 3, Number 10 (spl.) (2013)  

 

CONTENTS

 

PERFORMANCE COMPARISON OF FAKE IRIS DETECTION METHODS
Authors :
Smriti Rastogi, Dr. D. Malathi

EMULATION OF FTP SERVICE USING VIRTUAL HONEYPOT
Authors :
Aastha Bhandari, Sanmeet Kaur

Support System- Pioneering approach for Web Data Mining
Authors :
Geeta Kataria, Surbhi Kaushik , Nidhi Narang and Sunny Dahiya

Gathering Information From Wireless Sensor Network To Cloud and Accessing It Using Smartphone Application
Authors :
Govind Narayan Sakargayan,AM.J.Muthukumaran

TRUST EVALUATION BASED SECURITY IN WIRELESS SENSOR NETWORK
Authors :
Janani.C, Mrs. P.CHITRA 

Analysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks
Authors :
D. Balamurugan, S. Chandrasekar, D. Jaya Prakash, M.Usha

Design of Directional Coupler Using Synthesis Method on Defected Ground Structure
Authors : Rohit Samadhiya, Neeraj Sharma, Abhishek Tripathi, Sriram Gupta, Praveen Sharma

A Protocol on PicPass Based Key Establishment using Symmetric Key Cryptography
Authors : Kiran Kumar, Nagendra Nath Dube

Authentication and Authorization Issues For Multi-Hop Networks
Authors : Manvi Mishra, Shivangi Tyagi, Nikita Jaiswal and Shivangi Johri

 

 

 

 

 

 

 

 

[UP]

 

 

 All rights are reserved with Research India Publications                             Home  Journals  Contact