Vol 7, No 10 (2019)


Table of Contents


Data Possession Schemes with Reviving Authenticated Security in Cloud Computing PDF [Full Text]
R. Raakesh Kumar, U. Lova Raju 209-215
A Novel Method For Detecting Faulty Nodes In Tolerant Network PDF [Full Text]
Dudala Srinivasu, Palli Ramakrishna 216-218
A new dynamic access control technique to maintain PHRS in cloud PDF [Full Text]
Syed Nazural Islam, Lova Raju U 219-222
A new analysis of distributed faulty node detection in DTNS PDF [Full Text]
Suresh Karanam 223-225
A survey on detecting financial fraud with anomaly feature detection PDF [Full Text]
Sirisha Rajavarapu, Havilah G.K., Tatayyanaidu G 226-229
Secure data group sharing with attribute and time based encrypted data access over cloud PDF [Full Text]
Badaballa Rama Lakshmi, Perabathula Chitti Talli 230-233

Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.