INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME -
11, ISSUE - 3)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Providing Enhanced Method for Web Serving by Exploiting Email Tunnels |
IJRECS/V-11/I-3/01 |
|
S. Basheer Munni, K. Uma Devi |
2. |
An Efficient Secure Mechanism for Mobile Ad hoc Networks in Pre-Existing Routing |
IJRECS/V-11/I-3/02 |
|
G. Vijaya Laxmi, K. Uma Devi |
3. |
A Review on News Topics for Ranking and Identifying Using Social Media Factors |
IJRECS/V-11/I-3/03 |
|
S. Aishwrya, K. Uma Devi |
4. |
Detecting and Prediction of Fraud Ranking Search and Malware in Google Play |
IJRECS/V-11/I-3/04 |
|
D. Durga, K. Uma Devi |
5. |
Identity Based Mechanism for Finding Minimal on Road Route Scheduling |
IJRECS/V-11/I-3/05 |
|
G. V. Satya Laxmi, A. V. Nagamani |
6. |
Improving Phrase Search Mechanisms for Searching the Encrypted Data over the Cloud |
IJRECS/V-11/I-3/06 |
|
P. Sowgandhi, M. V. V. S. Sarma |
7. |
An Effective Method in Cloud Environment for Network Based Question and Answer System |
IJRECS/V-11/I-3/07 |
|
G. Sree Laxmi, K. Uma Devi |
8. |
A New Service Mechanism for the Applications of Cloud Revocation Authority by Identity Based Encryption |
IJRECS/V-11/I-3/08 |
|
K. Lavanya, M. V. V. S. Sarma |
9. |
Secure Mechanism for Preserving Data Privacy in Cloud by Remote Data Integrity Checking |
IJRECS/V-11/I-3/09 |
|
S. V. L. Sravani, M. V. V. S. Sarma |
10. |
Access Control in Online Social Networks for Sharing of Photos in Real Time |
IJRECS/V-11/I-3/10 |
|
K. Yamini, K. Uma Devi |
11. |
Learning Short Texts using Sequenced Enrichment and Hashing |
IJRECS/V-11/I-3/11 |
|
Ganta Radhika, K. Vaddi Kasulu |
12. |
Detecting Social User Behaviors towards Spam Account Detection |
IJRECS/V-11/I-3/12 |
|
Nandipamu Kiranmai, Ch. Sudhakar |
13. |
Effective Method to Prevent DOS Flooding Attacks on Network Traffic |
IJRECS/V-11/I-3/13 |
|
Gulipalli Venkata Pradeep Kumar, Byravarapu Prashant, Dr. G. Guru Kesava Das |
14. |
Efficient Scheme of OLSR Protocol by Fictitious Nodes for Prevention of DOS Attacks |
IJRECS/V-11/I-3/14 |
|
Mangalagiri Srilatha, Bondili Anusha |
15. |
A Novel Approach on the Satisfaction of Customer with Ensuring Quality of Service in Cloud Computing |
IJRECS/V-11/I-3/15 |
|
Daggumilli Naga Sai Bhavani, T. Rajesh |
16. |
A Survey on Distributed Denial-of-Service Flooding Attacks with Path Identifiers |
IJRECS/V-11/I-3/16 |
|
Dasthavejula Roja, Vunnava Dinesh Babu |
17. |
A Secure Framework in Real Time for Detecting Mobile Malicious WebPages |
IJRECS/V-11/I-3/17 |
|
P. Sowmya, K. Uma Devi |
18. |
A Hybrid Approach of Identity Based Encryption for Secure Sharing of Data in Cloud Computing |
IJRECS/V-11/I-3/18 |
|
Sheri Begum, B. Shalini |
19. |
Identity Based Mechanism for Finding Minimal on Road Route Scheduling |
IJRECS/V-11/I-3/19 |
|
B. Meenakshi, B. Bangar Naidu |
20. |
A Secure and Efficient Method for Real Time Semantic Search Query Approaches for Large Scale Storage Systems |
IJRECS/V-11/I-3/20 |
|
Lavanur Nagalakshmi, I. Siva Lakshmi |
21. |
A Scalable Method in Online Social Media for Reviews Using Network Based Spam Detection |
IJRECS/V-11/I-3/21 |
|
Mareedu Lahari, Dr. S. M. Roychoudri |
22. |
A Scalable and Distributed Approach in Mobile Cloud for Efficient Search of Encrypted Data |
IJRECS/V-11/I-3/22 |
|
B. Madhu Sree, V. Satish Kumar |