Table of Contents
Articles
| Powerful Mechanism To Avoid Denial Of Service Attack For Providing Data Security Using Software Puzzle | PDF [Full Text] |
| B.V.Pavan Krishna Akhil, R.P.S.P. Veerraju | 357-361 |
| A Novel Approach Of Privacy Preserving Data With Anonymizing Tree Structure | PDF [Full Text] |
| E. Lohitha, Khaleelullah . Shaik | 362-365 |
| Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data | PDF [Full Text] |
| G.Mohan Phanindra Reddy, K.C. Pradeep | 366-369 |
| The Instinctive Outline towards Online Shortest Path | PDF [Full Text] |
| T.Chandana Gouri | 370-376 |
| The Associated Reassurance Endorsement in Separated Web Search | PDF [Full Text] |
| T.Y. Ramakrushna | 377-383 |
| Impact Of EGR On The Exhaust Gas Temperature And Exhaust Darkness In Pressure Ignition Motors | PDF [Full Text] |
| Siva Kiran, G.S.Dk Sravani | 384-388 |
| The adaptive Privacy Policy Prediction for User Uploaded Images on Social Networks | PDF [Full Text] |
| Gnani Veerendranath CH, M Chinna Rao, Dr.A.V.S N.Murthy | 389-394 |
| Application of HPI (Heavy Metal Pollution Index) and Correlation Coefficient For The Assessment Of Ground Water Quality Near Ash Ponds Of Thermal Power Plants | PDF [Full Text] |
| Allian Majhi, Subhra Keshari Biswal | 395-405 |
| Protecting (PWS) Structure Ups To Generalize Profiles As Per Client Indicated Protection Requests | PDF [Full Text] |
| T.Rama Satya Vani, Satti.Vijaya Krishna Reddy | 406-409 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


