INTERNATIONAL JOURNAL FOR RESEARCH ON
ELECTRONICS AND COMPUTER SCIENCE
                    ISSN 2321-5485 (Online) ISSN 2321-5784 (Print)

INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME - 5, ISSUE - 1)

S.NO TITLE OF MANUSCRIPT ARTICLE ID DOWNLOAD
1. Analysis on Cost and Performance of Multi Cloud Platforms Using Priority Assignment IJRECS/V-5/I-1/01
Thatikonda Chandana, S. Sudha Rani
2. Efficient Authentication for Mobile Malware and Pervasive Computing IJRECS/V-5/I-1/02
Kandle Meena, M. Srilatha
3. Working of Build Confidential Query Services in the Cloud Efficiently Exploiting with RASP Data IJRECS/V-5/I-1/03
Nagulapall Kiran Kumar, Dr. P. Sunitha
4. Cooperative Caching for secure and Efficient Data Transmission in Disruption Tolerant Networks IJRECS/V-5/I-1/04
Kurakatla Bala Krishna Reddy, Dr. S. Krishna Mohan Rao
5. A Study on Aggressive Coding Plan for Palm Print Confirmation IJRECS/V-5/I-1/05
G. Mahaboobi, S. K. Imam Basha
6. Experimental Evaluation of Shortest Path and Distance Queries in Time-Dependent Spatial Networks IJRECS/V-5/I-1/06
Durgam Rajkumar, Ch. Venkateswara Rao
7. Survey of Resolving Difficult Keyword Queries over Search Engines IJRECS/V-5/I-1/07
Bandari Ravi, P. Raghu
8. Decentralized Access Control Using Secure Cloud Storage with Attribute Based Encryption IJRECS/V-5/I-1/08
SK. Apsaruneesa, R. Sudha Kishore
9. To Usage of 2 Resilience Mechanisms uitlizing Multi Topology Routing and Stub Routers IJRECS/V-5/I-1/09
Vankam Sreedhar Babu, K. V. Usha
10. Concurrent and Independent Access to Information as a Service Pattern IJRECS/V-5/I-1/10
Fahimeeda Sultana, R. Sudha kishore
11. Sharing Public Key in Crypto Systems Using Key Aggregation in Cloud Storage IJRECS/V-5/I-1/11
Ponnam Lalitha, Narra Sukhender Reddy
12. Security Analysis of Location Based Geo-Social Application IJRECS/V-5/I-1/12
Chenna Ravali, T. Mamatha
13. Dealing with CD: Utilizing Process Mining to Gain from Process Change in Developmental Framwworks IJRECS/V-5/I-1/13
Bala V Srinivasa Varma, P. N. K. Kameswar Rao
14. BISR: Conception and Effectuation of Built-in-Self Test and Self-Repairing Digital System IJRECS/V-5/I-1/14
Ravi Kumar Malothu
15. Evaluating Interrogative Secrecy in Location-Based Services IJRECS/V-5/I-1/15
V. Krishna Veni, D. Rajya Lakshmi
16. Efficient Authentication Techniques for Short Messages in Mobile Computing IJRECS/V-5/I-1/16
D. Sudheer, Dr. Prasanta Kumar Sahoo
17. RS: Assessing Collaborative Filtering Recommender Systems for Social Networks IJRECS/V-5/I-1/17
Konkapaka Gopi Krishna, G. Kalyana Chakravarthy
18. Searching the Proper Keyword across Relational Databases IJRECS/V-5/I-1/18
Sai Praveen Kumar Katteboina, Shaik Subhani
19. Published Data Protection in Multi Authority for Data Privacy IJRECS/V-5/I-1/19
Sadu Swaroopa Rani, Dr. P. Bala Krishna Prasad, Dr. G. Guru Kesava Das
20. Productive and Fast VLSI Displaying of Encoding Utilizing Sols Method and Clock Gating Procedure for Committed Short Range Correspondence Applications IJRECS/V-5/I-1/20
S. Neelima
21. Conceptualization-Based Query Responding For Dynamic Database IJRECS/V-5/I-1/21
T. Nagaraju, M. Deepthi
22. Enhanced Resource User Navigation through Pattern Based Restructuring IJRECS/V-5/I-1/22
Veluri Sirisha
23. Privacy Mining of Affiliation Rules in on a level plane Distributed Databases IJRECS/V-5/I-1/23
T. Naga Durga Charan, Shaik Subhani
24. Simultaneous and Independent Access to Encrypted Cloud Databases IJRECS/V-5/I-1/24
Bommareddy Prathyushareddy, Dr. G. Murali
25. A Comparative Study on Privacy-Preserving Data in Cloud Computing, with a Focus on User Revocation IJRECS/V-5/I-1/25
Ciril Kumar Yeddanapalli, K. L. V. G. K. Murthy
26. A Soft Scalable way for Monitoring Large Network Systems IJRECS/V-5/I-1/26
B. Padma, P. Sudheerbabu
27. Protection Protecting Multi-Keyword Positioned Search Over Encrypted Cloud Data IJRECS/V-5/I-1/27
Tummalagunta Sampath Kumar, Subhani Shaik
28. A Study on Evaluation of Automatically Generating Test Packets IJRECS/V-5/I-1/28
Y. Obula Reddy, S. Nabee Rasool
29. Privacy for Cooperation in Multi Cloud Registering Atmosphere IJRECS/V-5/I-1/29
Ala Anusha, Yasam Srinath
30. A Study on Enhancement of Pairwise Key Predistribution Scheme & Implementation of Links in Wireless Sensor Networks IJRECS/V-5/I-1/30
Tumati Jagadeesh, V. Lingamaiah, Dr. M. Janga Reddy
31. Assure Provenance: The Necessity of Bread and Butter of Data Forensics in Cloud Ciphering IJRECS/V-5/I-1/31
Architha Bellamkonda, Venu Babu
32. Shared Ascendancy Utilizing Privacy Preserving and Certification Protocol in Cloud Computing IJRECS/V-5/I-1/32
Gowsiya Shaik, V. Padmaja, Sayeed Yasin
33. A Review on Secure Data Aggregation Techniques of Wireless Sensor Networks IJRECS/V-5/I-1/33
B. M. Daya Kumar, N. Sarath Babu
34. A Burden Adjusting Model Based on Cloud Dividing for the Unfastened Cloud IJRECS/V-5/I-1/34
Baby Pravallika Velineni, M. Rao Batchanaboyina
35. Binocular Integration Behaviors for Quality Assessment of Stereoscopic 3D Image Compression IJRECS/V-5/I-1/35
B. Maheshwari, M. Raja Kumari
36. Improved for Protection Point with Conceivable Arrangements in Cloud Processing IJRECS/V-5/I-1/36
G. Sai Sindhura, K. Praveen Kumar
37. Secured Access to Encrypted Cloud Databases IJRECS/V-5/I-1/37
Valluru Baby Vasanthi, Sudhakar Vecha
38. Communication Protocols Purely Secured Based on Authenticated Location Services in Mobile Networks IJRECS/V-5/I-1/38
Parimisetti Saidarao, S. S. Radha