Table of Contents
Articles
An Enhanced Efficient User Revocation Mechanism on Top of Anonymous ABE | PDF [Full Text] |
Devineni Ramya Mounika, T.N arasimhappadu | 524-528 |
Efficient Scheme For Payment Minimization And Qos Services To Clients In Cloud | PDF [Full Text] |
P. Samyukta, D. Sirisha, Y. Srilatha | 529-532 |
Enhanced Reroute Integrity Checking Algorithm For Data Transmission In WSN | PDF [Full Text] |
M. Sunitha, G. Rajasekhar, M.Vamsi Krishna | 533-536 |
A Novel IP Trace-back Mechanism for Identifying IP Spoofers | PDF [Full Text] |
K. Rojarani, V.G.L Narasamba, M.Vamsi Krishna | 537-540 |
A Novel Algorithm For Similarity Calculation Of Image Patches | PDF [Full Text] |
K. Tanuja, U.V. Ratna Kumari | 541-544 |
Power Quality Improvement In Distribution Systems Using Facts Devices | PDF [Full Text] |
Ch.N.R.S. Chandrababu, V. V. N. Murthy | 545-550 |
A Novel Technique For Truthful Detection Of Packet Dropping Attack In Wireless Adhoc Networks | PDF [Full Text] |
VGL Narasamba, 2VSV Deepak, P. Sandeep Varma | 551-554 |
Using Adaptive Privacy Policy Prediction (A3P) for improved Privacy of User Data and Images on Content Sharing | PDF [Full Text] |
P. Harika, Addanki Kavitha | 555-557 |
A Study on properties of Coconut Oil and shells, an alternative to Regular Aggregate in Concrete | PDF [Full Text] |
Dhanala Vinaya, Gottala Anirudh | 558-566 |
AODV with DSR Protocol Heirarchy For Packet Dropped Forgery Attacks | PDF [Full Text] |
K.Ramya Sree, A. Radhika | 567-573 |
Providing Efficient Privacy Of Xml Data By Using Anonymity | PDF [Full Text] |
A.Veera Lakshmi, P.Nanna Babu | 574-576 |
Novel Protocol for Efficient And Secure Communication In DWSN | PDF [Full Text] |
M.Appala Raju, K.Pradeep Kumar | 577-580 |
Age-Invariant Recognition for Classifying Human Faces by Fusion of Shape and Texture Features | PDF [Full Text] |
K. Sony Grace, M.Raja Babu | 581-585 |
A Novel Image Annotation Method Using Tag Ranking System | PDF [Full Text] |
K. Sushma, N. Umadevi | 586-588 |
Data integrity and Auditing for Secured Cloud Data Storage | PDF [Full Text] |
D. Usha Raj, CH.Udaya Bhaskar | 589-592 |
Efficient Solution For Searchable Data Sharing In Public Cloud | PDF [Full Text] |
G.S. Aswini, B. Santhi Sri | 593-596 |
Content Security System On Cloud Based Multimedia | PDF [Full Text] |
Ms Jasmine, Gudipudi. Balaiah | 597-601 |
A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service | PDF [Full Text] |
P. Aparna, K.Satya Narayana Murthy | 602-604 |
A Data De-duplication Procedure To Protect The Data Security | PDF [Full Text] |
R.Bindu Madhavi, K.Satya Narayana Murthy | 605-608 |
Enhanced Document Search and Sharing Tool in Organized P2p Frameworks | PDF [Full Text] |
Mohammad Aslamsultana, SSSN Usha Devi N | 609-612 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â