International
Journal of Information & Computation Technology (IJICT)
Volume
3, Number 10 (spl.) (2013)
CONTENTS
PERFORMANCE COMPARISON OF FAKE IRIS DETECTION METHODS
Authors : Smriti Rastogi, Dr. D. Malathi
EMULATION OF FTP SERVICE USING VIRTUAL HONEYPOT
Authors : Aastha Bhandari, Sanmeet Kaur
Support System- Pioneering approach for Web Data Mining
Authors : Geeta Kataria, Surbhi Kaushik , Nidhi Narang and Sunny Dahiya
Gathering Information From Wireless Sensor Network To Cloud and Accessing It Using Smartphone Application
Authors : Govind Narayan Sakargayan,AM.J.Muthukumaran
TRUST EVALUATION BASED SECURITY IN WIRELESS SENSOR NETWORK
Authors : Janani.C, Mrs. P.CHITRA
Analysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks
Authors : D. Balamurugan, S. Chandrasekar, D. Jaya Prakash, M.Usha
Design of Directional Coupler Using Synthesis Method on Defected Ground Structure
Authors : Rohit Samadhiya, Neeraj Sharma, Abhishek Tripathi, Sriram Gupta, Praveen Sharma
A Protocol on PicPass Based Key Establishment using Symmetric Key Cryptography
Authors : Kiran Kumar, Nagendra Nath Dube
Authentication and Authorization Issues For Multi-Hop Networks
Authors : Manvi Mishra, Shivangi Tyagi, Nikita Jaiswal and Shivangi Johri
[UP]