Issue 3 of Volume 2

A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards

Authors: Aqeel Khalique, Kuldip Singh, Sandeep Sood

Malicious Dropping Attack in the Internet: Impacts and Solution

Authors: Lata L. Ragha, B. B. Bhaumik, S. K. Mukhopadhyay

Integration of Fuzzy Databases: Problems & Solutions

Authors: Awadhesh Kumar Sharma, A. Goswami, D.K. Gupta

A Comparative Analysis of Image Steganography

Authors: R.Amirtharajan, R. Akila, P.Deepikachowdavarapu

A VQ-DCT Scheme for Grayscale Image Watermarking

Authors: A.K. Pal, S. Das, G.P. Biswas, S. Mukhopadhyay

An Optimized All pair Shortest Paths Algorithm

Authors: Vijay Shankar Pandey, Rajendra Kumar, Dr. P K Singh

MIMO-OFDM Channel Estimation Using Pilot Carries

Authors: Kala Praveen Bagadi, Prof. Susmita Das

SECURED ENCRYPTION - Concept and Challenge

Authors: Govind Singh Tanwar, Ganesh Singh, Vishal Gaur

Dynamic Adaptation of Checkpoints and Rescheduling in Grid Computing

Authors: Antony Lidya Therasa.S, Sumathi.G, Antony Dalya.S

Network Forensic System for ICMP Attacks

Authors: Atul Kant Kaushik, R. C. Joshi