Current Issue

December 2016 (Volume 23/Issue 9)

S.No Paper Title No. Pages Download
1 AN EMPIRICAL STUDY ON RANKING FRAUD DETECTION FOR MOBILE APPS
Shrikrishna Shivajirao Chate
1-6 Click Here
2 AUTOMATIC DETECTION OF RED LESIONS FOR DIABETIC RETINOPATHY
Divya. R , Dr. L. M. Varalakshmi
7-10 Click Here
3 A GLORIFIED SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE ..
MYNAM SUSHMA DEVI , P. TULASI MAHALAKSHMI
11-17 Click Here
4 AN UNIQUE SCHEME FOR DETECTING IP SPOOFERS USING PASSIVE IP TRACEBACK
LANKA VENNELA , VEERA RAJU RYALI
18-23 Click Here
5 SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE IN A HIERARC..
B.KRANTHI KUMAR , VIKRUTHI RAMU
24-27 Click Here
6 A SECURE ENHANCED PRIVACY POLICY IN CONTENT SHARING SITES USING FACE-T..
MOHAMMAD MUNEERUDDIN , SHEIK AHMAD SHAH
28-31 Click Here
7 E2SQ-LBS: EXPLORING AND SECURING THE SPATIAL QUERIES OF LOCATION BASED..
PITHANI SATYA SAMEERA , NALLI SUJATHA KUMARI
32-35 Click Here
8 AN ENHANCED CIRCUIT CIPHERTEXT IN CLOUD BASED EFFICIENT USER REVOCATIO..
P. Lavanya , K. Kishore Raju
36-40 Click Here
9 KEY AGGREGATE CRYPTOSYSTEM FOR EFFICIENT WAY DATA SHARING IN CLOUD ENV..
M. Madhuri , K. Kishore Raju
41-45 Click Here
10 A Comparative Analysis of Function Point Analysis for the Deployment o..
I. Priyanka
46-49 Click Here
11 A Secure and Efficient Way for Data Aggregation Using Advanced Diffie ..
Ningappa Uppal , Dr. Arun Biradar
50-56 Click Here
12 BUG RECTIFICATION WITH SOFTWARE DATA REDUCTION USING BUG TRIAGE
Dr. G. P. Saradhi Varma , Alluri Surya Charan
57-60 Click Here
13 A REINFORCED LOCATION PRIVACY SYSTEM WITH DISTRIBUTED AND VENUE CENTRI..
N. Rahul , A. Vikas , T. Balachander
61-67 Click Here
14 DEVELOPMENT OF FFT BASED HIGH SPEED AUDIO MORPHING SYSTEM ON FPGA
A.S.Khodke , A.B.Jagdale
68-70 Click Here
15 Energy Efficient Cross-Layer Network Operation in Mobile Wireless Sens..
Mahalakshmi M , Lokesh S , Hemanth S R
71-77 Click Here
16 ENHANCED DYNAMIC ROUTING WITH SECURE TRANSMISSION IN WSN USING ELGAMAL..
DADALA SUMA , SHEIK AHMAD SHAH
78-81 Click Here
17 A Novel Secure Protocol for Continuous Authentication using Blowfish A..
YALLA TEJASWINI , D.VIJAYA KUMARI
82-87 Click Here
18 DEVELOPING AN AUTHORIZED DEDUPLICATION SYSTEM IN HYBRID CLOUD MODEL
MANDAVILLI GAYATHRI DEVI , KALADI GOVINDARAJU
88-91 Click Here
19 Aggregate Key Based Data Sharing in Cloud Storage
PEDDIREDDY SRI SATYA LAKSHMI SUJAYA , CH.SUBHASH
92-94 Click Here
20 Enhanced Network Coding based Opportunistic Routing with Collision Det..
AVANIGADDA MANASA , YALLA SATYA SUDHEER
95-99 Click Here

Institutional Affiliates

Indexing Affiliates