Table of Contents
Articles
Powerful Mechanism To Avoid Denial Of Service Attack For Providing Data Security Using Software Puzzle | PDF [Full Text] |
B.V.Pavan Krishna Akhil, R.P.S.P. Veerraju | 357-361 |
A Novel Approach Of Privacy Preserving Data With Anonymizing Tree Structure | PDF [Full Text] |
E. Lohitha, Khaleelullah . Shaik | 362-365 |
Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data | PDF [Full Text] |
G.Mohan Phanindra Reddy, K.C. Pradeep | 366-369 |
The Instinctive Outline towards Online Shortest Path | PDF [Full Text] |
T.Chandana Gouri | 370-376 |
The Associated Reassurance Endorsement in Separated Web Search | PDF [Full Text] |
T.Y. Ramakrushna | 377-383 |
Impact Of EGR On The Exhaust Gas Temperature And Exhaust Darkness In Pressure Ignition Motors | PDF [Full Text] |
Siva Kiran, G.S.Dk Sravani | 384-388 |
The adaptive Privacy Policy Prediction for User Uploaded Images on Social Networks | PDF [Full Text] |
Gnani Veerendranath CH, M Chinna Rao, Dr.A.V.S N.Murthy | 389-394 |
Application of HPI (Heavy Metal Pollution Index) and Correlation Coefficient For The Assessment Of Ground Water Quality Near Ash Ponds Of Thermal Power Plants | PDF [Full Text] |
Allian Majhi, Subhra Keshari Biswal | 395-405 |
Protecting (PWS) Structure Ups To Generalize Profiles As Per Client Indicated Protection Requests | PDF [Full Text] |
T.Rama Satya Vani, Satti.Vijaya Krishna Reddy | 406-409 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â