Table of Contents
Articles
Improved Mca Based Dos Attack Detection | PDF [Full Text] |
Lakshmi Prasanna Kumar Relangi, M Krishna Satya Varma | 293-297 |
Detection of Behavioral Malware in Delay Tolerant Networks | PDF [Full Text] |
Kolanu Venkata Krishna Sasikanth, K.Satyanarayana Raju | 298-302 |
An Unprecedented Approach of Detecting and Reporting System of Earthquakes Using Tweet Analysis | PDF [Full Text] |
Hemantha Mareedu, Ella Karunakar | 303-306 |
Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm | PDF [Full Text] |
KandiKattu Balaji Swamy, K.KISHORE RAJU | 307-311 |
Establishing a Trust-Worthy Social Authentications | PDF [Full Text] |
Dakupati Omprakash, K Satyanarayana Raju | 312-317 |
Secure Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | PDF [Full Text] |
Vundrajavarapu Ajay Kumar, K. Satyanarayana Raju | 318-322 |
Transmitting Data Securely and Efficiently in Cluster-based Wireless Sensor Networks | PDF [Full Text] |
Mugada Sri Lakshmi Vani, B.RajaSrinivasa Reddy | 323-327 |
Results Search from Web Databases using automatic Annotation Wrapper | PDF [Full Text] |
Anuradha .Podile, Chinta.Venkata Murali Krishna | 328-330 |
A review of Data Mining Techniques Using in Big Data | PDF [Full Text] |
Venkata Madhavi . Vinnakota, Chinta.Venkata Murali Krishna | 331-336 |
Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks | PDF [Full Text] |
N. Vijaya Bharatha Lakshmi, K.V.S.S. Rama Krishna | 337-341 |
Proficient Authentication Mechanism for Mobile and Pervasive Computing | PDF [Full Text] |
Kantamraju Anuhya, G Syam Prasad | 342-345 |
A Novel System for Privacy-Preserving Access Control for Relational Data with Accuracy | PDF [Full Text] |
Sai Sirisha Chittineni, Bandarupalli Mouleswara Rao | 346-350 |
Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism | PDF [Full Text] |
Chaparala Pushya, G Syam Prasad | 351-355 |
Message Endorsement and Informant Confidentiality In Wireless Set of Connections | PDF[FULL TEXT] |
Kanakmedala krishna priya, sk mubeena sultana | 356-361 |
Scattered Security System for Mobile Networks through Assorted Contraption | PDF[FULL TEXT] |
subhashini putla, hanumant prasad a | 362-368 |
Pesticide Toxicity Classification using Data Mining Techniques | PDF [Full Text] |
Issac Syam Sundar Palli, Sandeep Yelisetti | 378-385 |
She–PWM Cascaded Seven level Inverter With Adjustable DC Voltage Levels Control For D-Statcom Applications | PDF [Full Text] |
Rani Hepsiba, P. V. Prasuna | 386-392 |
Electronic Circuits Diagnosis Using Artificial Neural Networks | PDF [Full Text] |
Yogesh Kumar | 393-402 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â