All Issues

September 2016 (Volume 23/Issue 5)/ Issues 5

S.No Paper Title No. Pages Download
1 SECURE DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION-TOLERANT MILITARY NETWORKS
P.BALAMURUGAN,T.USHARANI
88-91 Click Here
2 AN EFFICIENT AND SECURE PRIVACY PRESERVING FRIEND RECOMMENDATION SCHEME FOR ONLINE SO..
Maya Ben N.A,Asha Jose
92-95 Click Here
3 AN EFFICIENT SECURE AUTHENTICATION USING IDENTITY BASED CRYPTOGRAPHY IN TWO-SERVER PA..
Nimmi George,George T. Vadakkumcheril
96-100 Click Here
4 A Novel Spatial Temporal discretization Technique for Mobile charging in Wireless rec..
Jagadevi Kencha,B.M.Thippeswamy
101-107 Click Here
5 Simultaneous Wireless Information and Power Transfer with a Cooperative Relay in Wire..
Sawale Bhagyashree Babruvhan ,B.M Thippeswamy
108-113 Click Here
6 A PROTOTYPE MODEL FOR NETWORK SECURITY VIRTUALIZATION
Manu Thomas Jose,Bismin Chacko
114-118 Click Here
7 ENERGY EFFICIENT & CONGESTION CONTROL IN WIRELESS SENSOR NETWORK USING FIREFLY ALGORITHM
J.LALITHA,Dr. C.KALAISELVI
119-122 Click Here
8 GEOGRAPHIC DISTANCE BASED CONNECTED-K NEIGHBORHOOD (GCKN) SLEEP SCHEDULING ALGORITHM
P.KARTHIKAMBAL,Dr. C.KALAISELVI
123-126 Click Here
9 SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE IN A HIERARCHICAL CLUSTERIN..
Sadeer Dheyaa Abdulameer
127-129 Click Here
10 NOVEL BIG DATA MODEL FOR SPOTTING THE BEHAVIOR PATTERNS OF ELECTRICITY DEMAND
Sindhu Janardhanarao
130-134 Click Here
11 A Secure Cluster based VANET Modelling System with keyed Hash Message Authentication Code
Dhanya,Dr.L.Pavithira
135-140 Click Here
12 QUERIES ANNOTATION PROCESS FOR EFFICIENT INFORMATION RETRIEVAL SYSTEMS
Ch. Mounika,V. Chandra Shekhar Rao
141-143 Click Here
13 APPORTIONING OF THE TEMPORAL ORIENTED DATA IN THE PROCESS MINING
P. Sree Lakshmi,V. Shankar
144-147 Click Here
14 Awareness of Behavioral Malware Detection in Delay Tolerant Networks (DTN)
K.SIVAPRASUNA,M.CHANDRA SEKHAR
148-151 Click Here
15 EFFICIENT APPROACH OF BIGDATABENCH FOR BIG DATA BENCHMARK SUITE
G.MANICKARAJA,C.MUTHUBHARATHI
152-155 Click Here
16 USING DATA REDUCTION TECHNIQUES FOR EFFECTIVE BUG TRIAGE
E.MUTHUKUMAR,C.MUTHUBHARATHI
156-159 Click Here
17 An Improved Malignant Application Blocker System in Facebook Like online social netwo..
T.A KAVITHA,S. SIVAKUMAR
160-165 Click Here
18 DETECTING KEY RECOVERY ATTACKS USING ABNORMALITY RECOGNITION SCHEME AND PROXY SIGNATU..
M.AHILA DEVI,K.RANJITHSINGH
166-169 Click Here
19 User Identity Verification for using Biometrics with Continuous in Secure Internet Se..
SHAIK ABDUL KHADAR JIALNI,MD.AMANATULLA
170-173 Click Here
20 IMPLEMENTATION OF RISC BASED 2D-DWT ARCHITECTURE FOR IMAGE COMPRESSION
G.Lakshmi prasanna,S.Ravichand
174-178 Click Here

Institutional Affiliates

Indexing Affiliates

Leave a Comment