1 | A Novel Approach for Providing Security to Cloud Computing Shaik Rafi, J.V.AnilKumar | IJRCSE/V3/1-301 | |
2 | Fastest & Efficient Image Searching from Large Scale Image Collection Venkata Pavan Kumar Bonam, V.N.S Vijay Kumar | IJRCSE/V3/1-302 | |
3 | An Efficient and Secure Data Publishing Gurram Eswara Prasad, Nagaraju Medida | IJRCSE/V3/1-303 | |
4 | Efficiently Identifying User Behaviors in Social Networks Pullaiah Pinnika, G.Anantha Rao | IJRCSE/V3/1-304 | |
5 | A New Approach to Protect the Location Privacy in Sensor Networks N.Nalini, B. Purushotham | IJRCSE/V3/1-305 | |
6 | Web Content Management by Using Mobile Management System S. Ravi, A.Syamprasad | IJRCSE/V3/1-306 | |
7 | Scalable and Strong Protection of Cloud Data for the Masses Moses Sandepudi, Mr. G. Satish | IJRCSE/V3/1-307 | |
8 | Background subtraction based on Local Shape J.Dhanaji, T.Padmaja | IJRCSE/V3/1-308 | |
9 | Ensuring Distributed Accountability for Data sharing in the Cloud through ip blocking Merugumalli. Suresh Babu, Vulli Ganesh Dutt | IJRCSE/V3/1-309 | |
10 | Efficiently Grouping the Similar Behaviours in Social Media Network B.Rama Deepthi, A.Srinivasa Reddy | IJRCSE/V3/1-310 | |
11 | SNRM-Implementation of Security by Non-Observable Routing in MANET M. Shirisha, K. Ashok Babu | IJRCSE/V3/1-311 | |
12 | Design of Qos Oriented Secure Data Transmission Protocol in MANET Mohan Babu.S, B.Sandhya | IJRCSE/V3/1-312 | |
13 | Influence of Enhanced MANET protocol in VANET D. Anuradha, Prashanth Pise | IJRCSE/V3/1-313 | |
14 | Fast Data Collection in Energy Aware Wireless Sensor Networks Lokesh Kumar Alla | IJRCSE/V3/1-314 | |
15 | A Novel Approach To Accountability For Data Sharing in The Cloudcomputing V.Srinivasareddy, K.Srinivasa Rao, M.Sridevi | IJRCSE/V3/1-315 | |
16 | Privacy Preserving Data Publishing Using Slicing P.Sowmya Sri, R.Lakshmi Tulasi | IJRCSE/V3/1-316 | |
17 | Iterative Joint Sentiment Topic Extraction from Text V.Swaroopa, V.Vidya Sagar | IJRCSE/V3/1-317 | |
18 | Data Sharing In Cloud Based On Advanced Encryption Standards and Assuring For Accountability Boddupalli Datta Kiran, Bala Krishna Yakkala | IJRCSE/V3/1-318 | |
19 | A Survey of Framework for Implementing a Trust Aware Routing Of WSN Nelofer Amreen, S.P.Anandaraj, S.Poornima, K.Johnson | IJRCSE/V3/1-319 | |
20 | File Sharing and Correlation in Unstrusted Peer-To-Peer Network K.Yallareddy, Navnath Kale | IJRCSE/V3/1-320 | |
21 | A Secure Sharing Of Personal Health Information Using Attribute Based Encryption Shriharsh Mandava, K. Nageshwara Rao | IJRCSE/V3/1-321 | |
22 | Building Trust Between Outsource R and Worker with Payments of Outsourced Computation K.Shalivahan Reddy, K. Nageshwara Rao | IJRCSE/V3/1-322 | |
23 | Control the Congestion and Traffic Using Priority and Admission Control Algorithms D.Udayadurgarani, Dr. P. Harini | IJRCSE/V3/1-323 | |
24 | Sync: Two Words Zero Retransmission to Overhead to an Approach of Retransmission K.Moinuddin, Mr. N Pavan Kumar, Ms.Vajeeda Sultana | IJRCSE/V3/1-324 | |
25 | Packet Switched Networks Forwarding in Social Mobile Wireless Networks of Selfishness Sana Ahmadi, Mr. N Pavan Kumar, Mr. M N A Baig | IJRCSE/V3/1-325 | |
26 | Spot: Spam Zombies Detection Monitoring Outgoing Messages Vasu Babu Gavini , B.Sreenivasa Rao | IJRCSE/V3/1-326 | |