1 |
AN EMPIRICAL STUDY ON RANKING FRAUD DETECTION FOR MOBILE APPS
Prof. V. R. Chirchi, Shrkrishna Shivajirao Chate
|
1-6 |
|
2 |
AUTOMATIC DETECTION OF RED LESIONS FOR DIABETIC RETINOPATHY
Divya. R,Dr. L. M. Varalakshmi
|
7-10 |
|
3 |
A GLORIFIED SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE WITH A HIERARCH..
MYNAM SUSHMA DEVI,P. TULASI MAHALAKSHMI
|
11-17 |
|
4 |
AN UNIQUE SCHEME FOR DETECTING IP SPOOFERS USING PASSIVE IP TRACEBACK
LANKA VENNELA,VEERA RAJU RYALI
|
18-23 |
|
5 |
SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE IN A HIERARCHICAL CLUSTERIN..
B.KRANTHI KUMAR,VIKRUTHI RAMU
|
24-27 |
|
6 |
A SECURE ENHANCED PRIVACY POLICY IN CONTENT SHARING SITES USING FACE-TO-FACE KEY DIST..
MOHAMMAD MUNEERUDDIN,SHEIK AHMAD SHAH
|
28-31 |
|
7 |
E2SQ-LBS: EXPLORING AND SECURING THE SPATIAL QUERIES OF LOCATION BASED SERVICES OVER ..
PITHANI SATYA SAMEERA,NALLI SUJATHA KUMARI
|
32-35 |
|
8 |
AN ENHANCED CIRCUIT CIPHERTEXT IN CLOUD BASED EFFICIENT USER REVOCATION MECHANISM ON ..
P. Lavanya ,K. Kishore Raju
|
36-40 |
|
9 |
KEY AGGREGATE CRYPTOSYSTEM FOR EFFICIENT WAY DATA SHARING IN CLOUD ENVIRONMENT
M. Madhuri,K. Kishore Raju
|
41-45 |
|
10 |
A Comparative Analysis of Function Point Analysis for the Deployment of Software Projects
I. Priyanka
|
46-49 |
|
11 |
A Secure and Efficient Way for Data Aggregation Using Advanced Diffie Hellman and Sig..
Ningappa Uppal,Dr. Arun Biradar
|
50-56 |
|
12 |
BUG RECTIFICATION WITH SOFTWARE DATA REDUCTION USING BUG TRIAGE
Dr. G. P. Saradhi Varma ,Alluri Surya Charan
|
57-60 |
|
13 |
A REINFORCED LOCATION PRIVACY SYSTEM WITH DISTRIBUTED AND VENUE CENTRIC MODEL
N. Rahul,A. Vikas ,T. Balachander
|
61-67 |
|
14 |
DEVELOPMENT OF FFT BASED HIGH SPEED AUDIO MORPHING SYSTEM ON FPGA
A.S.Khodke,A.B.Jagdale
|
68-70 |
|
15 |
Energy Efficient Cross-Layer Network Operation in Mobile Wireless Sensor Networks
Mahalakshmi M,Lokesh S,Hemanth S R
|
71-77 |
|
16 |
ENHANCED DYNAMIC ROUTING WITH SECURE TRANSMISSION IN WSN USING ELGAMAL SIGNATURE BASE..
DADALA SUMA ,SHEIK AHMAD SHAH
|
78-81 |
|
17 |
A Novel Secure Protocol for Continuous Authentication using Blowfish Algorithm
YALLA TEJASWINI ,D.VIJAYA KUMARI
|
82-87 |
|
18 |
DEVELOPING AN AUTHORIZED DEDUPLICATION SYSTEM IN HYBRID CLOUD MODEL
MANDAVILLI GAYATHRI DEVI ,KALADI GOVINDARAJU
|
88-91 |
|
19 |
Aggregate Key Based Data Sharing in Cloud Storage
PEDDIREDDY SRI SATYA LAKSHMI SUJAYA,CH.SUBHASH
|
92-94 |
|
20 |
Enhanced Network Coding based Opportunistic Routing with Collision Detection with Min..
AVANIGADDA MANASA ,YALLA SATYA SUDHEER
|
95-99 |
|