Table of Contents
Articles
Data Possession Schemes with Reviving Authenticated Security in Cloud Computing | PDF [Full Text] |
R. Raakesh Kumar, U. Lova Raju | 209-215 |
A Novel Method For Detecting Faulty Nodes In Tolerant Network | PDF [Full Text] |
Dudala Srinivasu, Palli Ramakrishna | 216-218 |
A new dynamic access control technique to maintain PHRS in cloud | PDF [Full Text] |
Syed Nazural Islam, Lova Raju U | 219-222 |
A new analysis of distributed faulty node detection in DTNS | PDF [Full Text] |
Suresh Karanam | 223-225 |
A survey on detecting financial fraud with anomaly feature detection | PDF [Full Text] |
Sirisha Rajavarapu, Havilah G.K., Tatayyanaidu G | 226-229 |
Secure data group sharing with attribute and time based encrypted data access over cloud | PDF [Full Text] |
Badaballa Rama Lakshmi, Perabathula Chitti Talli | 230-233 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â