1 | Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks Reena Chaudhary, Sachin Chaudhary, Ankur Bhardwaj | IJRCSE/V5/3-1401 | |
2 | Energy Efficient Survivable Path Routing in Wireless Sensor Network Tanu Mohan, Sachin Chaudhary, Kumar Shanu | IJRCSE/V5/3-1402 | |
3 | Secure Data Collection using Symmetric Key Cryptography Sakshi Verma, Ankur Bhardwaj, Sachin Chaudhary | IJRCSE/V5/3-1403 | |
4 | Exact Image Restoration from Double Random Projection K.Anusha,R.Chinna Appala Naidu | IJRCSE/V5/3-1404 | |
5 | Vector Valued-Feature Oriented Enhancement by Parallel Level Sets B.Preethi,U.Shivaji | IJRCSE/V5/3-1405 | |
6 | Safe Removal of Connection Policy in Level Circulated Database Saride Sruthi,Ralla Suresh,I.Narsimha Rao | IJRCSE/V5/3-1406 | |
7 | An input-comprehensive Cryptosystem used for Scalable records sharing within Cloud storage space A.Anusha Rmana,D.Aswini,I.Narsimha Rao | IJRCSE/V5/3-1407 | |
8 | Stability at the Same Time as Examination K.Krishna Priyanka,I.Narsimha Rao | IJRCSE/V5/3-1408 | |
9 | Enhancing Reliability and Effectiveness in Impute Based Data Division Saride Swathi,K.Ram Mohan,I.Narsimha Rao | IJRCSE/V5/3-1409 | |
10 | TrustedDB:A Trusted Hardware Based Catalog Through Isolation and Statistics Discretion Sd.Nazia Parveen,Ralla Suresh,I.Narsimha Rao | IJRCSE/V5/3-1410 | |
11 | Evaluating the Effectiveness of Relational Keyword Search with Experimental Results S.Sai Lakshmi,Ralla Suresh,I.Narsimha Rao | IJRCSE/V5/3-1411 | |
12 | An isolation-Preserving Multi-Keyword Rank Seek out in Excess of Encrypted Cloud Data Pittala.Chandana,B.Bhavani,I.Narsimha Rao | IJRCSE/V5/3-1412 | |
13 | Web Based Privacy-Aware DaaS Services Composition Talari Christu Kumari,L.Abdul Saleem | IJRCSE/V5/3-1413 | |
14 | Aspect Resource Distribution in Cloud Methods for Artistic Conveyance Samineni.Mounika,I.Narsimha Rao | IJRCSE/V5/3-1414 | |
15 | Signals Oriented Data Loss for Reliability Content Transportation Networks Aakula Krishna Soujanya,N.Sujata Gupta | IJRCSE/V5/3-1415 | |
16 | Assistance Seclusion and Security in Personalized Data Navigating Kota Harini,L.Abdul Saleem | IJRCSE/V5/3-1416 | |
17 | K-Designing and Architecture for Monitoring Patients at Home Medak Yochitha, R.China Appala Naidu | IJRCSE/V5/3-1417 | |
18 | Balancing the Load in Cloud for Distributed Systems Rahul, C H Sravan Kumar | IJRCSE/V5/3-1418 | |
19 | Efficient Mapping and Modeling of Human Networks Information Sharing System Shashikala Nara, N.Sujata Gupta | IJRCSE/V5/3-1419 | |
20 | Unprincipled Historical Repression Inpainting image Color Relocate Veena.Pentyala, M.Sridevi | IJRCSE/V5/3-1420 | |
21 | An Efficient Algorithm for Privacy Preserving in Geo-social Applications Bommideni Revathi, Ravi Kumar Vemula, K. Praveen Kumar | IJRCSE/V5/3-1421 | |
22 | Real Time Event Management System Swati Kaushik, Pushpneel Verma, Sachin Chaudhary | IJRCSE/V5/3-1422 | |
23 | Improved Dynamic Site Distribution in Privacy Preserved Networks A.Sindhu Priyadarshini, Ch. Vijaya Bhaskar | IJRCSE/V5/3-1423 | |
24 | Enhancing Security of Online Payment System Kalal Sairam Goud,Vadrevu SSS Balaram | IJRCSE/V5/3-1424 | |
25 | Implementation of Key Management Strategies for Attribute-Based Encryption Vetcha Pujitha, N.Chaithanya Kumar | IJRCSE/V5/3-1425 | |
26 | Human Activity Recognition Based on Image Segmentation Suryadevara Sravanthi, D.Ratna Kishore | IJRCSE/V5/3-1426 | |
27 | Reliable Obtaining Horizontally Distributed Databases Using Cryptography and Schema Models Thaisin.Syed, Ch.Naga Santhosh Kumar, Madhira Srinivas | IJRCSE/V5/3-1427 | |
28 | Reliability and Impedimenta Based Database with Security and Information Access Sharada.Vutukuri, Ch.Naga Santhosh Kumar, Madhira Srinivas | IJRCSE/V5/3-1428 | |
29 | EASY SMS: A Protocol for End-To-End Secure K.Dhanalakshmi, B.Sunil | IJRCSE/V5/3-1429 | |
30 | Dynamic Approach for Increasing Efficiency and Confidentiality in Cloud Query Services Bolishetty Raja Vinesh, Menta Mosheck | IJRCSE/V5/3-1430 | |
31 | Effective implementation of Web based re-ranking using CBIR (Content based Image Retrieval) Nomula Sahithi, Ramana Nagavelli | IJRCSE/V5/3-1431 | |
32 | Security and Privacy-Enhancing Multicloud Architectur Kotupalli Koteswaramma, Thota Ramnadh babu | IJRCSE/V5/3-1432 | |
33 | Secure and Efficient Bounded Ciphertext Policy for Disruption Tolerant Networks Banoth Dinesh Nayak, Dara Raju, Nara Nalini | IJRCSE/V5/3-1433 | |
34 | Improving Auditing Cloud Consistency Using CaaS Model P.RAJITHA, B.SAILAJA | IJRCSE/V5/3-1434 | |