Table of Contents
Articles
| Improved Mca Based Dos Attack Detection | PDF [Full Text] |
| Lakshmi Prasanna Kumar Relangi, M Krishna Satya Varma | 293-297 |
| Detection of Behavioral Malware in Delay Tolerant Networks | PDF [Full Text] |
| Kolanu Venkata Krishna Sasikanth, K.Satyanarayana Raju | 298-302 |
| An Unprecedented Approach of Detecting and Reporting System of Earthquakes Using Tweet Analysis | PDF [Full Text] |
| Hemantha Mareedu, Ella Karunakar | 303-306 |
| Multi-keyword Ranked Search over Encrypted Cloud Data Using RSA Algorithm | PDF [Full Text] |
| KandiKattu Balaji Swamy, K.KISHORE RAJU | 307-311 |
| Establishing a Trust-Worthy Social Authentications | PDF [Full Text] |
| Dakupati Omprakash, K Satyanarayana Raju | 312-317 |
| Secure Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | PDF [Full Text] |
| Vundrajavarapu Ajay Kumar, K. Satyanarayana Raju | 318-322 |
| Transmitting Data Securely and Efficiently in Cluster-based Wireless Sensor Networks | PDF [Full Text] |
| Mugada Sri Lakshmi Vani, B.RajaSrinivasa Reddy | 323-327 |
| Results Search from Web Databases using automatic Annotation Wrapper | PDF [Full Text] |
| Anuradha .Podile, Chinta.Venkata Murali Krishna | 328-330 |
| A review of Data Mining Techniques Using in Big Data | PDF [Full Text] |
| Venkata Madhavi . Vinnakota, Chinta.Venkata Murali Krishna | 331-336 |
| Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks | PDF [Full Text] |
| N. Vijaya Bharatha Lakshmi, K.V.S.S. Rama Krishna | 337-341 |
| Proficient Authentication Mechanism for Mobile and Pervasive Computing | PDF [Full Text] |
| Kantamraju Anuhya, G Syam Prasad | 342-345 |
| A Novel System for Privacy-Preserving Access Control for Relational Data with Accuracy | PDF [Full Text] |
| Sai Sirisha Chittineni, Bandarupalli Mouleswara Rao | 346-350 |
| Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism | PDF [Full Text] |
| Chaparala Pushya, G Syam Prasad | 351-355 |
| Message Endorsement and Informant Confidentiality In Wireless Set of Connections | PDF[FULL TEXT] |
| Kanakmedala krishna priya, sk mubeena sultana | 356-361 |
| Scattered Security System for Mobile Networks through Assorted Contraption | PDF[FULL TEXT] |
| subhashini putla, hanumant prasad a | 362-368 |
| Pesticide Toxicity Classification using Data Mining Techniques | PDF [Full Text] |
| Issac Syam Sundar Palli, Sandeep Yelisetti | 378-385 |
| She–PWM Cascaded Seven level Inverter With Adjustable DC Voltage Levels Control For D-Statcom Applications | PDF [Full Text] |
| Rani Hepsiba, P. V. Prasuna | 386-392 |
| Electronic Circuits Diagnosis Using Artificial Neural Networks | PDF [Full Text] |
| Yogesh Kumar | 393-402 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


