Volume 23 Issue 9 – December 2016
Sl. No. | Paper Title | Authors | Download Paper |
2 | AUTOMATIC DETECTION OF RED LESIONS FOR DIABETIC RETINOPATHY | Divya. R, Dr. L. M. Varalakshmi | Download Paper |
3 | A GLORIFIED SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE WITH A HIERARCHICAL CLUSTERING COMPUTATION | MYNAM SUSHMA DEVI, P. TULASI MAHALAKSHMI | Download Paper |
4 | AN UNIQUE SCHEME FOR DETECTING IP SPOOFERS USING PASSIVE IP TRACEBACK | LANKA VENNELA, VEERA RAJU RYALI | Download Paper |
5 | SECURE SEARCH SCHEMA OVER ENCRYPTED SECURED CLOUD STORAGE IN A HIERARCHICAL CLUSTERING COMPUTATION | B.KRANTHI KUMAR, VIKRUTHI RAMU | Download Paper |
6 | A SECURE ENHANCED PRIVACY POLICY IN CONTENT SHARING SITES USING FACE-TO-FACE KEY DISTRIBUTION SCHEME | MOHAMMAD MUNEERUDDIN, SHEIK AHMAD SHAH | Download Paper |
7 | E2SQ-LBS: EXPLORING AND SECURING THE SPATIAL QUERIES OF LOCATION BASED SERVICES OVER PUBLIC CHANNEL | PITHANI SATYA SAMEERA, NALLI SUJATHA KUMARI | Download Paper |
8 | AN ENHANCED CIRCUIT CIPHERTEXT IN CLOUD BASED EFFICIENT USER REVOCATION MECHANISM ON TOP OF ANONYMOUS ABE | P. Lavanya, K. Kishore Raju | Download Paper |
9 | KEY AGGREGATE CRYPTOSYSTEM FOR EFFICIENT WAY DATA SHARING IN CLOUD ENVIRONMENT | M. Madhuri, K. Kishore Raju | Download Paper |
10 | A Comparative Analysis of Function Point Analysis for the Deployment of Software Projects | I. Priyanka | Download Paper |
11 | A Secure and Efficient Way for Data Aggregation Using Advanced Diffie Hellman and Signature Scheme for Wireless Sensor Networks | Ningappa Uppal, Dr. Arun Biradar | Download Paper |
12 | BUG RECTIFICATION WITH SOFTWARE DATA REDUCTION USING BUG TRIAGE | Dr. G. P. Saradhi Varma, Alluri Surya Charan | Download Paper |
13 | A REINFORCED LOCATION PRIVACY SYSTEM WITH DISTRIBUTED AND VENUE CENTRIC MODEL | N. Rahul, A. Vikas, T. Balachander | Download Paper |
14 | DEVELOPMENT OF FFT BASED HIGH SPEED AUDIO MORPHING SYSTEM ON FPGA | A.S.Khodke, A.B.Jagdale | Download Paper |
15 | Energy Efficient Cross-Layer Network Operation in Mobile Wireless Sensor Networks | Mahalakshmi M, Lokesh S, Hemanth S R | Download Paper |
16 | ENHANCED DYNAMIC ROUTING WITH SECURE TRANSMISSION IN WSN USING ELGAMAL SIGNATURE BASED MESSAGE AUTHENTICATION | DADALA SUMA, SHEIK AHMAD SHAH | Download Paper |
17 | A Novel Secure Protocol for Continuous Authentication using Blowfish Algorithm | YALLA TEJASWINI, D.VIJAYA KUMARI | Download Paper |
18 | DEVELOPING AN AUTHORIZED DEDUPLICATION SYSTEM IN HYBRID CLOUD MODEL | MANDAVILLI GAYATHRI DEVI, KALADI GOVINDARAJU | Download Paper |
19 | Aggregate Key Based Data Sharing in Cloud Storage | PEDDIREDDY SRI SATYA LAKSHMI SUJAYA, CH.SUBHASH | Download Paper |
20 | Enhanced Network Coding based Opportunistic Routing with Collision Detection with Minimum Flooding Time | AVANIGADDA MANASA, YALLA SATYA SUDHEER | Download Paper |