All Issues

December 2016 (Volume 23/Issue 9)/ Issues 9

S.No Paper Title No. Pages Download
1 AN EMPIRICAL STUDY ON RANKING FRAUD DETECTION FOR MOBILE APPS
Prof. V. R. Chirchi, Shrkrishna Shivajirao Chate
1-6 Click Here
2 AUTOMATIC DETECTION OF RED LESIONS FOR DIABETIC RETINOPATHY
Divya. R,Dr. L. M. Varalakshmi
7-10 Click Here
3 A GLORIFIED SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE WITH A HIERARCH..
MYNAM SUSHMA DEVI,P. TULASI MAHALAKSHMI
11-17 Click Here
4 AN UNIQUE SCHEME FOR DETECTING IP SPOOFERS USING PASSIVE IP TRACEBACK
LANKA VENNELA,VEERA RAJU RYALI
18-23 Click Here
5 SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE IN A HIERARCHICAL CLUSTERIN..
B.KRANTHI KUMAR,VIKRUTHI RAMU
24-27 Click Here
6 A SECURE ENHANCED PRIVACY POLICY IN CONTENT SHARING SITES USING FACE-TO-FACE KEY DIST..
MOHAMMAD MUNEERUDDIN,SHEIK AHMAD SHAH
28-31 Click Here
7 E2SQ-LBS: EXPLORING AND SECURING THE SPATIAL QUERIES OF LOCATION BASED SERVICES OVER ..
PITHANI SATYA SAMEERA,NALLI SUJATHA KUMARI
32-35 Click Here
8 AN ENHANCED CIRCUIT CIPHERTEXT IN CLOUD BASED EFFICIENT USER REVOCATION MECHANISM ON ..
P. Lavanya ,K. Kishore Raju
36-40 Click Here
9 KEY AGGREGATE CRYPTOSYSTEM FOR EFFICIENT WAY DATA SHARING IN CLOUD ENVIRONMENT
M. Madhuri,K. Kishore Raju
41-45 Click Here
10 A Comparative Analysis of Function Point Analysis for the Deployment of Software Projects
I. Priyanka
46-49 Click Here
11 A Secure and Efficient Way for Data Aggregation Using Advanced Diffie Hellman and Sig..
Ningappa Uppal,Dr. Arun Biradar
50-56 Click Here
12 BUG RECTIFICATION WITH SOFTWARE DATA REDUCTION USING BUG TRIAGE
Dr. G. P. Saradhi Varma ,Alluri Surya Charan
57-60 Click Here
13 A REINFORCED LOCATION PRIVACY SYSTEM WITH DISTRIBUTED AND VENUE CENTRIC MODEL
N. Rahul,A. Vikas ,T. Balachander
61-67 Click Here
14 DEVELOPMENT OF FFT BASED HIGH SPEED AUDIO MORPHING SYSTEM ON FPGA
A.S.Khodke,A.B.Jagdale
68-70 Click Here
15 Energy Efficient Cross-Layer Network Operation in Mobile Wireless Sensor Networks
Mahalakshmi M,Lokesh S,Hemanth S R
71-77 Click Here
16 ENHANCED DYNAMIC ROUTING WITH SECURE TRANSMISSION IN WSN USING ELGAMAL SIGNATURE BASE..
DADALA SUMA ,SHEIK AHMAD SHAH
78-81 Click Here
17 A Novel Secure Protocol for Continuous Authentication using Blowfish Algorithm
YALLA TEJASWINI ,D.VIJAYA KUMARI
82-87 Click Here
18 DEVELOPING AN AUTHORIZED DEDUPLICATION SYSTEM IN HYBRID CLOUD MODEL
MANDAVILLI GAYATHRI DEVI ,KALADI GOVINDARAJU
88-91 Click Here
19 Aggregate Key Based Data Sharing in Cloud Storage
PEDDIREDDY SRI SATYA LAKSHMI SUJAYA,CH.SUBHASH
92-94 Click Here
20 Enhanced Network Coding based Opportunistic Routing with Collision Detection with Min..
AVANIGADDA MANASA ,YALLA SATYA SUDHEER
95-99 Click Here

Institutional Affiliates

Indexing Affiliates

Leave a Comment