View Papers For All
September 2016 (Volume 2 / Issue 2)
Volume 2 / Issue 1
DETECTION OF LOOK ALIKE DETECTION OF CLONE NODE AND COLLUSION ATTACKS IN WSN
Authors: R. Aswini | P. R. Jayanthi
HIDE ME AND AUTHENTICATE IMPLEMENTATION OF MULTI PARTY KEY AUTHENTICATION AND SAPA PROTOCOL FOR SECURED DATA TRANSACTION IN CLOUD
Authors: R. Archana | S. Prasanna
MITIGATING WEB SPAM TAXONOMY FOR MOBILE APP USING LINK PRUNING AND REWEIGHTING ALGORITHM
Authors: V. Suriya | R. Mohan
Volume 2 / Issue 2
N JOINT AUTHORITIES: INTEGRATION OF SECURED CLOUD DATA ACCESS PRIVILEGE WITH ATTRIBUTE BASED ENCRYPTION OVER DISTRIBUTED AUTHORITIES
Authors: G. Saraswathi | J. Jayapriya
PROVIDING SECURITY FOR PUBLIC DATA AUDITABILITY IN REGENERATION BASED CLOUD STORAGE
Authors: R. Saranya | S. Vanakovarayan
REAL TIME FRAUD DETECTION SYSTEM USING DATA MINING TECHNIQUES
Authors: K. Nithya | E. Lavanya
Volume 2 / Issue 3
ROLE CHECK SECURED USER DATA ACCESS WITH ATTRIBUTE-BASED ENCRYPTION, DYNAMIC KEY GENERATION & USER REVOCATION SYSTEM
Authors: D. Arthy | T. Priya Rathika Devi
SUSPICIOUS MOVEMENT DETECTION AND TRACKING BASED ON COLOR HISTOGRAM
Authors: R. Thiripurasundhari | K. Lakshminarayanan
USER ACTIVITY MONITORING FOR DYNAMIC AND FLEXIBLE GROUP KEY GENERATION
Authors: R. Shanmuga Sundaram | T. Priya Rathika Devi
Volume 2 / Issue 4
AN ADVANCED MOBILE TRACKING SYSTEM WITH PIN POINTS USING ANDROID SMART PHONES
Authors: Dr.K.Venkata Rao | K.Vineet
Cloud Computing Service for Dynamic Data Storage System
Authors: K. Rajkumar | Dr. G. Shanmugasundaram