To search, Click below search items.
All Published Papers Search Service
Title
Evaluating Layer 3 Device Tunneling and Access Control List Security Bandwidths Using B-Node Theory
Author
S P Maj, D Veal
Vol. 10 No. 9 pp. 127-135
Keywords
Network Security, B-Nodes, Access Control Lists, Tunneling
IMS Based Network Stored Address Book using the XCAP Protocol
Aakanksha Aggarwal, H. Anthony Chan
Vol. 10 No. 9 pp. 119-126
IMS, NGN, SIP, XCAP
Design and Development of an Intelligent Routing Protocol for Mobile Ad hoc Network :A Review Paper
Er.Rakesh Kumar, Piush Verma, Yaduvir Singh
Vol. 10 No. 9 pp. 111-118
Ad hMobile adhoc Networks, Node Density (ND), Power Consumption (PC), Node Status (NS), Traffic Congestion (TC), Throughput, Genetic Algorithms, Analytical Hierarchy Process
Scalable Dynamic Key Based Group Key Management System
S.Santhi, M.Aramudhan, A.Shanmugasundaram
Vol. 10 No. 9 pp. 106-110
Group key management, scalability, dynamic key