| 1 | Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks Reena Chaudhary, Sachin Chaudhary, Ankur Bhardwaj | IJRCSE/V5/3-1401 |  |
| 2 | Energy Efficient Survivable Path Routing in Wireless Sensor Network Tanu Mohan, Sachin Chaudhary, Kumar Shanu | IJRCSE/V5/3-1402 |  |
| 3 | Secure Data Collection using Symmetric Key Cryptography Sakshi Verma, Ankur Bhardwaj, Sachin Chaudhary | IJRCSE/V5/3-1403 |  |
| 4 | Exact Image Restoration from Double Random Projection K.Anusha,R.Chinna Appala Naidu | IJRCSE/V5/3-1404 |  |
| 5 | Vector Valued-Feature Oriented Enhancement by Parallel Level Sets B.Preethi,U.Shivaji | IJRCSE/V5/3-1405 |  |
| 6 | Safe Removal of Connection Policy in Level Circulated Database Saride Sruthi,Ralla Suresh,I.Narsimha Rao | IJRCSE/V5/3-1406 |  |
| 7 | An input-comprehensive Cryptosystem used for Scalable records sharing within Cloud storage space A.Anusha Rmana,D.Aswini,I.Narsimha Rao | IJRCSE/V5/3-1407 |  |
| 8 | Stability at the Same Time as Examination K.Krishna Priyanka,I.Narsimha Rao | IJRCSE/V5/3-1408 |  |
| 9 | Enhancing Reliability and Effectiveness in Impute Based Data Division Saride Swathi,K.Ram Mohan,I.Narsimha Rao | IJRCSE/V5/3-1409 |  |
| 10 | TrustedDB:A Trusted Hardware Based Catalog Through Isolation and Statistics Discretion Sd.Nazia Parveen,Ralla Suresh,I.Narsimha Rao | IJRCSE/V5/3-1410 |  |
| 11 | Evaluating the Effectiveness of Relational Keyword Search with Experimental Results S.Sai Lakshmi,Ralla Suresh,I.Narsimha Rao | IJRCSE/V5/3-1411 |  |
| 12 | An isolation-Preserving Multi-Keyword Rank Seek out in Excess of Encrypted Cloud Data Pittala.Chandana,B.Bhavani,I.Narsimha Rao | IJRCSE/V5/3-1412 |  |
| 13 | Web Based Privacy-Aware DaaS Services Composition Talari Christu Kumari,L.Abdul Saleem | IJRCSE/V5/3-1413 |  |
| 14 | Aspect Resource Distribution in Cloud Methods for Artistic Conveyance Samineni.Mounika,I.Narsimha Rao | IJRCSE/V5/3-1414 |  |
| 15 | Signals Oriented Data Loss for Reliability Content Transportation Networks Aakula Krishna Soujanya,N.Sujata Gupta | IJRCSE/V5/3-1415 |  |
| 16 | Assistance Seclusion and Security in Personalized Data Navigating Kota Harini,L.Abdul Saleem | IJRCSE/V5/3-1416 |  |
| 17 | K-Designing and Architecture for Monitoring Patients at Home Medak Yochitha, R.China Appala Naidu | IJRCSE/V5/3-1417 |  |
| 18 | Balancing the Load in Cloud for Distributed Systems Rahul, C H Sravan Kumar | IJRCSE/V5/3-1418 |  |
| 19 | Efficient Mapping and Modeling of Human Networks Information Sharing System Shashikala Nara, N.Sujata Gupta | IJRCSE/V5/3-1419 |  |
| 20 | Unprincipled Historical Repression Inpainting image Color Relocate Veena.Pentyala, M.Sridevi | IJRCSE/V5/3-1420 |  |
| 21 | An Efficient Algorithm for Privacy Preserving in Geo-social Applications Bommideni Revathi, Ravi Kumar Vemula, K. Praveen Kumar | IJRCSE/V5/3-1421 |  |
| 22 | Real Time Event Management System Swati Kaushik, Pushpneel Verma, Sachin Chaudhary | IJRCSE/V5/3-1422 |  |
| 23 | Improved Dynamic Site Distribution in Privacy Preserved Networks A.Sindhu Priyadarshini, Ch. Vijaya Bhaskar | IJRCSE/V5/3-1423 |  |
| 24 | Enhancing Security of Online Payment System Kalal Sairam Goud,Vadrevu SSS Balaram | IJRCSE/V5/3-1424 |  |
| 25 | Implementation of Key Management Strategies for Attribute-Based Encryption Vetcha Pujitha, N.Chaithanya Kumar | IJRCSE/V5/3-1425 |  |
| 26 | Human Activity Recognition Based on Image Segmentation Suryadevara Sravanthi, D.Ratna Kishore | IJRCSE/V5/3-1426 |  |
| 27 | Reliable Obtaining Horizontally Distributed Databases Using Cryptography and Schema Models Thaisin.Syed, Ch.Naga Santhosh Kumar, Madhira Srinivas | IJRCSE/V5/3-1427 |  |
| 28 | Reliability and Impedimenta Based Database with Security and Information Access Sharada.Vutukuri, Ch.Naga Santhosh Kumar, Madhira Srinivas | IJRCSE/V5/3-1428 |  |
| 29 | EASY SMS: A Protocol for End-To-End Secure K.Dhanalakshmi, B.Sunil | IJRCSE/V5/3-1429 |  |
| 30 | Dynamic Approach for Increasing Efficiency and Confidentiality in Cloud Query Services Bolishetty Raja Vinesh, Menta Mosheck | IJRCSE/V5/3-1430 |  |
| 31 | Effective implementation of Web based re-ranking using CBIR (Content based Image Retrieval) Nomula Sahithi, Ramana Nagavelli | IJRCSE/V5/3-1431 |  |
| 32 | Security and Privacy-Enhancing Multicloud Architectur Kotupalli Koteswaramma, Thota Ramnadh babu | IJRCSE/V5/3-1432 |  |
| 33 | Secure and Efficient Bounded Ciphertext Policy for Disruption Tolerant Networks Banoth Dinesh Nayak, Dara Raju, Nara Nalini | IJRCSE/V5/3-1433 |  |
| 34 | Improving Auditing Cloud Consistency Using CaaS Model P.RAJITHA, B.SAILAJA | IJRCSE/V5/3-1434 |  |