Table of Contents
Articles
| Data Possession Schemes with Reviving Authenticated Security in Cloud Computing | PDF [Full Text] |
| R. Raakesh Kumar, U. Lova Raju | 209-215 |
| A Novel Method For Detecting Faulty Nodes In Tolerant Network | PDF [Full Text] |
| Dudala Srinivasu, Palli Ramakrishna | 216-218 |
| A new dynamic access control technique to maintain PHRS in cloud | PDF [Full Text] |
| Syed Nazural Islam, Lova Raju U | 219-222 |
| A new analysis of distributed faulty node detection in DTNS | PDF [Full Text] |
| Suresh Karanam | 223-225 |
| A survey on detecting financial fraud with anomaly feature detection | PDF [Full Text] |
| Sirisha Rajavarapu, Havilah G.K., Tatayyanaidu G | 226-229 |
| Secure data group sharing with attribute and time based encrypted data access over cloud | PDF [Full Text] |
| Badaballa Rama Lakshmi, Perabathula Chitti Talli | 230-233 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


