Sl. No. | Paper Title | Authors | Download Paper |
1 | ANONYMIZING TREE STRUCTURE WITH PRIVACY PRESERVING DATA | GALLA PEDDAPUNNAIAH, YANGALADASU KIRAN | Download Paper |
2 | Efficient Mechanism Using Privacy Preserving Photo Sharing On SNSs | NARENDRAREDDY.A, P.GAYATHRI | Download Paper |
3 | FPGA Implementation of Sharing Logic for Built in Generation using 3×3 Circuit Under test | MVV Sankar Prasad, Vijendra Dandimudi | Download Paper |
4 | High-Speed and Energy-Efficient Carry Skip Adder Operating Under a Wide Range of Supply Voltage Levels | Benarji Babu.Devarakonda, CH.RAJESH BABU | Download Paper |
5 | FPGA Implementation of Low Power Carry Skip adder based Pre-Encoded Multipliers Based on Non-Redundant Radix-4 Signed-Digit Encoding | SURESH SANAPALA, G V VINOD | Download Paper |
6 | Avoiding Reduplications and Providing Secure Auditing In Cloud | SK.NAZIYA BANU, I. TABHITA | Download Paper |
7 | Dynamic Data Possession and Outsourcing Data Storage with Provable Multicopy in Cloud | MOHAMMAD JAINAB MOTHI, GUNTAPALLI MINNI, SAYEED YASIN | Download Paper |
8 | Improve Reliability using Secure Distributed Deduplication System in Cloud | SALMA SHAIK, GUNTAPALLI MINNI, SAYEED YASIN | Download Paper |
9 | User Revocation with Public Auditing for Shared Data in cloud | P.DIVYA VANI, P.LAKSHMAN RAO, SAYEED YASIN | Download Paper |
10 | PERSONALIZED SEARCH FOR TRAVEL RECOMMENDATION MODEL FROM HIGH DIMENSIONAL DATABASES | R. Carolene Praveena, K. Sakthi | Download Paper |
11 | IDENTITY BASED PROXY RE-ENCRYPTION ALGORITHM FOR SECURE DATA SHARING MODEL IN CLOUD COMPUTING | Naveen Kumar C.G, Dr.Sanjay Pande.M.B | Download Paper |
12 | A REVIEW ON WIRELESS BODY AREA NETWORKS | A.Shafana Mulafar, Dr.D.Anitha | Download Paper |
13 | SHARING PERSONAL HEALTH RECORDS IN CLOUD WITH SCALABLE AND SECURE USING ABE | SHAIK SHAHINA, GUNTAPALLI MINNI, SAYEED YASIN | Download Paper |
14 | A NOVEL APPROACH FOR PRIVACY PRESERVING PHOTO SHARING ON SNSS | SHAIK.NOORUDDIN, I. TABHITA, SAYEED YASIN | Download Paper |
15 | PACKET DROP, FORGERY ATTACK AND DETECTION METHODS IN WIRELESS SENSOR NETWORK | NATTA PAVANI, V.PADMAJA, SAYEED YASIN | Download Paper |
16 | A NEW MECHANISAM IN PROXIMITY MALWARE IN DELAY TOLERANT NETWORKS | NAGOORVALI SHAIK, GUNTAPALLI MINNI, SAYEED YASIN | Download Paper |
17 | A NEW SECURITY MECHANISAM IN RANKED MULTI-KEYWORD SEARCH FOR MULTIPLE DATA OWNERS IN CLOUD COMPUTING | L.LAVANYA, B.S.VARA PRASAD | Download Paper |
18 | IN REAL-TIME ANALYSIS TO FIND THE TWITTER STREAM | NATHA PRASANTHI, CH. LAVANYA SUSANA, SAYEED YASIN | Download Paper |
19 | A NEW APPROACH FOR DISTORTION-RESISTANT ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS | SHAIK MOHAMMED ARIF ALI, SAYEED YASIN | Download Paper |
20 | A VITAL INVESTIGATION ON DEDUPLICATION IN CLOUD | K.B M Pavan Kumar, V.Chandra Sekhara Rao | Download Paper |
21 | A STUDY ON OPPORTUNISTIC ROUITING IN WIRELESS AD HOC NETWORKS | P.Balamurugan, Dr.S.Dhanalakshmi | Download Paper |
22 | A REVIEW FOR VARIOUS DATA COMPRESSION ALGORITHNS AND METHODS IN CLOUD STORAGE | V.Sherine Vargheese, Dr.D.Maruthanayagam | Download Paper |
23 | A REVIEW ON HADOOP AND MAPREDUCE TECHNIQUES IN BIGDATA | V.Shanmugapriya, Dr.D.Maruthanayagam | Download Paper |
24 | A REVIEW ON RESOURCE RESERVATION IN GRID ENVIRONMENT | S.Sivakumar, Dr.D.Maruthanayagam | Download Paper |