Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
Articles
Current
Archives
Authors
Guidelines
Rights and Responsibilities
Benefits
Make a Submissions
Policies
Frequently Asked Questions
Editorial Policy
Open Access Policy
Privacy Policy
Publication Ethics
Withdrawal, Retraction, Correction
Editorial Team
About
About the Journal
Article Publishing Fee
Abstracting and Indexing
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
Vol. 2 No. 6 (2014): Transactions on Networks and Communications
Vol. 2 No. 6 (2014): Transactions on Networks and Communications
Transactions on Networks and Communications
Volume 2, Issue 6, December 2014
DOI:
https://doi.org/10.14738/tnc.26.2014
Published:
2015-01-06
Full Issue
TNC Vol 2 No 6: Complete Issue
Articles
Effect of Varying Packet Interval Time on Multihop Routing Protocol in Wireless Sensor Network
Namita Sharma, Parveen Kakkar
01-11
PDF
DOI:
https://doi.org/10.14738/tnc.26.615
Cloud Services Usage Profile Based Intruder Detection and Prevention System: Intrusion Meter
Dinesha Hagare Annappaian, Vinod Kumar Agrawal
12-24
PDF
DOI:
https://doi.org/10.14738/tnc.26.590
Optimization of WSNs Flooding Rates by Khalimsky Topology
Mahmoud Abdellaoui, Riyadh Gargouri, Mahmoud Mezghani
25-38
PDF
DOI:
https://doi.org/10.14738/tnc.26.598
Multipath Discovery Algorithms for VoD Streaming In Wireless Mesh Network
Praful Chandrakant Ramteke, V.S. Jadhav, Raju Wadekar
39-46
PDF
DOI:
https://doi.org/10.14738/tnc.26.523
Multilevel Cryptography with Metadata and Lock Approach for Storing Data in Cloud
Dinesha Hagare Annappaian, Vinod Kumar Agrawal
47-55
PDF
DOI:
https://doi.org/10.14738/tnc.26.591
Internet Economics of Distributed Systems
Hans W Gottinger
55-70
PDF
DOI:
https://doi.org/10.14738/tnc.26.847
Author Center
About the Journal
Current Issue
Archives
Make a Submission
Author Guidelines
Call for Papers
Indexing
Follow Us
Current Issue
Most Read Last Week
Cryptography and Steganography: New Approach
49
Big Data and Machine Learning Driven Open5GMEC for Vehicular Communications
15
Optimization of WSNs Flooding Rates by Khalimsky Topology
7
Exploiting Cryptocurrency Miners with OISNT Techniques
5
File Carving Survey on Techniques, Tools and Areas of Use
4
Keywords