Table of Contents
Articles
| Design and Performance Analysis of slotted E-Shape Microstrip Patch Antenna for Wireless Applications | PDF [Full Text] |
| V Ramesh | 410-415 |
| Intelligent Anti-Theft System for Automobiles | PDF [Full Text] |
| B Jhony, A Venkateswara Rao | 416-422 |
| Increase of Charge-Coupled Device Resolution limits using Spatial Light Modulator | PDF [Full Text] |
| Mohammad Sohail, Nigar Fida, Haroon Khan, Muhammad Noman Hayat | 423-426 |
| Iris recognition Using Fast Walsh Hadamard Transform Based feature Space | PDF [Full Text] |
| Shahid Akbar, Maqsood Hayat, Mohammad Sohail, Haroon Khan | 427-429 |
| Mobile Ad hoc Networks Challenges | PDF [Full Text] |
| Inam Ullah Khan, Faheem Numan, Shaheen Ahmad | 430-433 |
| Mobile Ad hoc networks in the Global system of Interconnected Computer Networks | PDF [Full Text] |
| Alamgir Safi, Inam Ullah Khan, Muhammad Abul Hassan, Muhammad Asghar | 434-451 |
| Tweet Mining from General Elections of a Country | PDF [Full Text] |
| Muhammad Noman Hayat, Nigar Fida, Haroon Khan, Mohammad Sohail | 452-454 |
| Achieving Privacy And Security In Multi Owner Cloud Using Novel Secure Search Protocol And AES | PDF [Full Text] |
| V.B.T. Rajeswari, R. Srinivas | 455-459 |
| Access Control And Security Mechanisms On Sensitive Information | PDF [Full Text] |
| P. Srivijaya, D Srinivas | 460-463 |
| A New Strategy for Productive Information Access In MDTN | PDF [Full Text] |
| K.Satya Veera Venkata Lakshmi, Chandra Sekhar Rayudu Chandra Sekhar Rayudu | 464-467 |
| Improve the Security and Usability of User Session using Continuous Authentication Protocol | PDF [Full Text] |
| M.V.Vinaya Nagini, CH Prasada Rao | 468-470 |
| Efficient Image Annotation Process Using Tag Ranking Scheme | PDF [Full Text] |
| T.Siri Chandana, M.Anil kumar | 471-473 |
| Privacy Policy Detection To Preserve The Confidentiality Of Shared Content In Social Media | PDF [Full Text] |
| Veeramala Devi, K.Naga B hargavi | 474-476 |
| A different approach for improved Privacy of User Data and Images on Content Sharing Sites using(A3P) | PDF [Full Text] |
| Kotcharla Siva Sankar Babu, B.Sandhya Rani | 477-480 |
| A Systematic Puzzle Approach of Deploying Software For Restricting Dos & DDOS Attacks | PDF [Full Text] |
| Gelli Naga Venkata Vinay Kumar, Md. Amanatulla | 481-484 |
| Fault Localization Scheme Constructed Using The Header Space Framework | PDF [Full Text] |
| K. Satyaeswaridevi, Sk. Ahmadshah | 485-488 |
| A New Approach to NCL Selection In DTNS Based On a Probabilistic Selection Metric | PDF [Full Text] |
| P.Durga Bhavani, Ramu Vikrtui | 489-492 |
| Analysis Of Reranking Techniques For Web Image Search With Attribute –Assisted | PDF [Full Text] |
| Kiranmai Madireddi, P.Lakshmana Rao, Sayeed Yasin | 493-496 |
| A Novel Approach For Using Multi-Keyword Ranked Search Scheme Over Encrypted in Secure And Dynamic Cloud Data | PDF [Full Text] |
| Syed Sadat Ali Alias Abdul Gani, Sayeed Yasin | 497-501 |
| Certificate less Effective Key Management Protocol For Secure Communications | PDF [Full Text] |
| K.Sandhya Vineela, S. Jyothirmayee | 502-505 |
| Transparent User Authentication Using Biometric Traits for Secure Internet Services | PDF [Full Text] |
| Keerthi Kaja, M.Chandra Sekhar | 506-509 |
| A Novel Approach For Improve Reliability Using Secure Distributed De-duplication System In Cloud | PDF [Full Text] |
| Shaik Mahammad Irfan, Md. Amanatulla | 510-514 |
| Key-Aggregate Model Search for Group Data Sharing Using Patient-Controlled Encryption In Cloud | PDF [Full Text] |
| Md. Hafijunnisa, G. Minni, Sayeed Yasin | 515-519 |
| Data Recovery and Integrity Checking By Proxy In Cloud | PDF [Full Text] |
| S.Sowmya Sirisha, R.S rinivas | 520-523 |
Copyright © 2013, All rights reserved.| ijseat.com

International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â


