1 |
(MOSTKASE): MULTI OWNER SINGLE TRAPDOOR KEY AGGREGATED SEARCHING ENCRYPTION FOR GROUP..
Anitha Letchumi B,Mr Pandia Raj
|
1-5 |
|
2 |
REVERSIBLE WATERMARKING USING CANNY EDGE DETECTION ALGORITHM IN RELATIONAL DATA
Bharathy A,Vanitha C,Uma R, Janarthanan. R
|
6-10 |
|
3 |
AN EFFICIENT AND COLLABORATIVE FILTERING BASED FRIEND RECOMMENDATION FOR SOCIAL NETWO..
Augustian Issac,Christy Angelina J
|
11-15 |
|
4 |
PATH TRACING IN CAMERA BASED WIRELESS SENSOR NETWORK
Divija. P,Janarthanan. R
|
16-19 |
|
5 |
DEVELOPMENT OF ROBUST ENVIRONMENT MONITORING IN WIRELESS SENSOR NETWORK
DIVYA S,GNANA SEKAR V
|
20-23 |
|
6 |
A SECURE AND EFFICIENT MULTIUSER REVOCATION WITH DATA AUDITING FOR SHARED DYNAMIC CLO..
Augustian Issac,Jagagururam S
|
24-27 |
|
7 |
PARTIALLY DISTRIBUTED SPECTRUM SENSING APPROACH FOR COGNITIVE MACHINE TO MACHINE COMM..
Santhosh Karthikyean,Arun Kumar
|
28-31 |
|
8 |
A PRIVACY PRESERVATION FRAMEWORK IN CROSS-CLOUD SERVICES FOR BIG DATA APPLICATIONS
Vignesh Kumar G,Arun Kumar S
|
32-37 |
|
9 |
ENHANCE FINE GRAINED ACCESS CONTROL IN DCP ABE WITH INCLUDING EXPLICIT ATTRIBUTES
D.Prakash,SP Maniraj
|
38-40 |
|
10 |
QUALITY OF SERVICE MONITORING AND PREDICTION IN CLOUD COMPUTING ENVIRONMENTS
Dr J Jegadeesan,Karuppaiah V
|
41-46 |
|
11 |
AN EFFECTIVE SYSTEM FOR DATA LEAKAGE DETECTION
S Kalaichelvan,Mrs. V.Praveena
|
47-51 |
|
12 |
A COMBINED SDC-SDF ARCHITECTURE FOR NORMAL I/O PIPELINED RADIX – 4 FFT
KANNAIAH .R,Mrs.S.Jeya Anusuya
|
52-55 |
|
13 |
DETECTION AND CLASSIFICATION OF EPILEPTIC SEIZURE USING RBF NEURAL NETWORK
A. P. Karthika,R. S. Vijayanand
|
56-60 |
|
14 |
ANDROID PLATFORM BASED ECG ARRHYTHMIA AND HEART RATE ANALYSIS SYSTEM
M. Logeshwari,N. Subhalakshmi
|
61-63 |
|
15 |
UNWANTED URL FILTRATION & NOISY CONTENT REMOVAL FROM WEB PAGES
Mr. S.P.Maniraj,Mukesh M
|
64-68 |
|
16 |
EFFECTIVE RESOURCE ALLOCATION IN THE CLOUD FOR VIDEO ON DEMAND APPLICATIONS
Bennet Prabha MS,Parameswaran M
|
69-71 |
|
17 |
A SECURE AND EFFICIENT ERASURE CODE-BASED CONTENT TRANSMISSION IN CLOUD USING CP-ABE ..
G.Anitha,Mr.S.Arunkumar
|
72-75 |
|
18 |
OPTIMIZING THE E-LEARNING RESOURCES USING RANKING ALGORITHM
K.Lavanya,Dr.C.Nalini
|
76-79 |
|
19 |
CLOUD SECURITY USING THIRD PARTY AUDITING AND ENCRYPTION SERVICE IN MULTIPLE PUBLIC CLOUDS
S.Sumathi,Mr.K.G.S.Venkatesan
|
80-84 |
|
20 |
A SECURE DATA SHARING IN PUBLIC CLOUDS WITH INDEPENDENT KEY GENERATION USING ELLIPTIC..
Dhanya C,Dr.C.Nalini
|
85-87 |
|