Table of Contents
Articles
A secure cloud storage scheme on fog computing- ð‘‹ð‘œð‘Ÿâˆ’ð¶ð‘œð‘šð‘ð‘–ð‘›ð‘Žð‘¡ð‘–ð‘œð‘›, ðµð‘™ð‘œð‘ð‘˜âˆ’ð‘€ð‘Žð‘›ð‘Žð‘”ð‘’ð‘šð‘’ð‘›ð‘¡ and ð¶ð‘…ð» operation | PDF [Full Text] |
A.Tejaswi Gurunath, K.V.V.L. Madhuri | 029-032 |
The transition probability features between user click streams based on the social situation analytics; to detect malicious social bots | PDF [Full Text] |
Juvva Manjari, Nadella Sunil | 033-036 |
A novel SSGK to protect the communication process and shared data from unauthorized access | PDF [Full Text] |
B. Venkateswara Rao, P.Radhika Krupalini | 037-040 |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â