Volume-5 , Issue-5 , May - 2017 Go Back

Open Access   Article

Multiple Auditing Schemes with Integrity and Reliability in Cloud Computing

MS. Sulthana, T. Samatha, V. Sravani, A. Mahendra
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.1-6, May-2017
Open Access   Article

Building Information Modelling: Interoperability Issues

R.S. Kartikeayan, S. Salmaliza, Y. Mohd Rashid
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.7-19, May-2017
Open Access   Article

A Quantum Inspired Evolutionary Computational Technique with Applications to Structural Engineering Design

Astuti. V., K. Hansraj, A. Srivastava
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.20-33, May-2017
Open Access   Article

Eliminating Collaborative Black-hole Attack by Using Fuzzy Logic in Mobile Ad-hoc Network

A. Sharma, P.K. Johari
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.34-41, May-2017
Open Access   Article

Double Security of RFID Credit Cards

M.A.A. Khan, A.A.S. Qureshi, M. Farooqui
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.42-46, May-2017
Open Access   Article

Ttpse- Trusted Third Party With Symmetric Encryption Towards Secured Cloud Storage

Shreeraghav kulkarni, Sujata Terdal
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.47-51, May-2017
Open Access   Article

Favorable Secure Broadcast Encryption with Static Cipher texts

P. Patidar, Iyapparaja M.
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.52-57, May-2017
Open Access   Article

Snakes and Stairs Game Design using Automata Theory

N. Raj, R. Dubey
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.58-62, May-2017
Open Access   Article

Spam Detection on Social Media Text

G. Jain, Manisha, B. Agarwal
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.63-70, May-2017
Open Access   Article

Resolving Multi-party Privacy Clashes in Online P TO P Social Networking

R. Tandon, Prabadevi B.
Research Paper | Journal Paper
Vol.5 , Issue.5 , pp.71-76, May-2017
Next    Last