INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME -
5, ISSUE - 1)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Analysis on Cost and Performance of Multi Cloud Platforms Using Priority Assignment |
IJRECS/V-5/I-1/01 |
|
Thatikonda Chandana, S. Sudha Rani |
2. |
Efficient Authentication for Mobile Malware and Pervasive Computing |
IJRECS/V-5/I-1/02 |
|
Kandle Meena, M. Srilatha |
3. |
Working of Build Confidential Query Services in the Cloud Efficiently Exploiting with RASP Data |
IJRECS/V-5/I-1/03 |
|
Nagulapall Kiran Kumar, Dr. P. Sunitha |
4. |
Cooperative Caching for secure and Efficient Data Transmission in Disruption Tolerant Networks |
IJRECS/V-5/I-1/04 |
|
Kurakatla Bala Krishna Reddy, Dr. S. Krishna Mohan Rao |
5. |
A Study on Aggressive Coding Plan for Palm Print Confirmation |
IJRECS/V-5/I-1/05 |
|
G. Mahaboobi, S. K. Imam Basha |
6. |
Experimental Evaluation of Shortest Path and Distance Queries in Time-Dependent Spatial Networks |
IJRECS/V-5/I-1/06 |
|
Durgam Rajkumar, Ch. Venkateswara Rao |
7. |
Survey of Resolving Difficult Keyword Queries over Search Engines |
IJRECS/V-5/I-1/07 |
|
Bandari Ravi, P. Raghu |
8. |
Decentralized Access Control Using Secure Cloud Storage with Attribute Based
Encryption |
IJRECS/V-5/I-1/08 |
|
SK. Apsaruneesa, R. Sudha Kishore |
9. |
To Usage of 2 Resilience Mechanisms uitlizing Multi Topology Routing and Stub
Routers |
IJRECS/V-5/I-1/09 |
|
Vankam Sreedhar Babu, K. V. Usha |
10. |
Concurrent and Independent Access to Information as a Service Pattern |
IJRECS/V-5/I-1/10 |
|
Fahimeeda Sultana, R. Sudha kishore |
11. |
Sharing Public Key in Crypto Systems Using Key Aggregation in Cloud Storage |
IJRECS/V-5/I-1/11 |
|
Ponnam Lalitha, Narra Sukhender Reddy |
12. |
Security Analysis of Location Based Geo-Social Application |
IJRECS/V-5/I-1/12 |
|
Chenna Ravali, T. Mamatha |
13. |
Dealing with CD: Utilizing Process Mining to Gain from Process Change in
Developmental Framwworks |
IJRECS/V-5/I-1/13 |
|
Bala V Srinivasa Varma, P. N. K. Kameswar Rao |
14. |
BISR: Conception and Effectuation of Built-in-Self Test and Self-Repairing Digital System |
IJRECS/V-5/I-1/14 |
|
Ravi Kumar Malothu |
15. |
Evaluating Interrogative Secrecy in Location-Based Services |
IJRECS/V-5/I-1/15 |
|
V. Krishna Veni, D. Rajya Lakshmi |
16. |
Efficient Authentication Techniques for Short Messages in Mobile Computing |
IJRECS/V-5/I-1/16 |
|
D. Sudheer, Dr. Prasanta Kumar Sahoo |
17. |
RS: Assessing Collaborative Filtering Recommender Systems for Social Networks |
IJRECS/V-5/I-1/17 |
|
Konkapaka Gopi Krishna, G. Kalyana Chakravarthy |
18. |
Searching the Proper Keyword across Relational Databases |
IJRECS/V-5/I-1/18 |
|
Sai Praveen Kumar Katteboina, Shaik Subhani |
19. |
Published Data Protection in Multi Authority for Data Privacy |
IJRECS/V-5/I-1/19 |
|
Sadu Swaroopa Rani, Dr. P. Bala Krishna Prasad, Dr. G. Guru Kesava Das |
20. |
Productive and Fast VLSI Displaying of Encoding Utilizing Sols Method and Clock Gating Procedure for Committed Short Range Correspondence Applications |
IJRECS/V-5/I-1/20 |
|
S. Neelima |
21. |
Conceptualization-Based Query Responding For Dynamic Database |
IJRECS/V-5/I-1/21 |
|
T. Nagaraju, M. Deepthi |
22. |
Enhanced Resource User Navigation through Pattern Based Restructuring |
IJRECS/V-5/I-1/22 |
|
Veluri Sirisha |
23. |
Privacy Mining of Affiliation Rules in on a level plane Distributed Databases |
IJRECS/V-5/I-1/23 |
|
T. Naga Durga Charan, Shaik Subhani |
24. |
Simultaneous and Independent Access to Encrypted Cloud Databases |
IJRECS/V-5/I-1/24 |
|
Bommareddy Prathyushareddy, Dr. G. Murali |
25. |
A Comparative Study on Privacy-Preserving Data in Cloud Computing, with a Focus on User Revocation |
IJRECS/V-5/I-1/25 |
|
Ciril Kumar Yeddanapalli, K. L. V. G. K. Murthy |
26. |
A Soft Scalable way for Monitoring Large Network Systems |
IJRECS/V-5/I-1/26 |
|
B. Padma, P. Sudheerbabu |
27. |
Protection Protecting Multi-Keyword Positioned Search Over Encrypted Cloud Data |
IJRECS/V-5/I-1/27 |
|
Tummalagunta Sampath Kumar, Subhani Shaik |
28. |
A Study on Evaluation of Automatically Generating Test Packets |
IJRECS/V-5/I-1/28 |
|
Y. Obula Reddy, S. Nabee Rasool |
29. |
Privacy for Cooperation in Multi Cloud Registering Atmosphere |
IJRECS/V-5/I-1/29 |
|
Ala Anusha, Yasam Srinath |
30. |
A Study on Enhancement of Pairwise Key Predistribution Scheme & Implementation of Links in Wireless Sensor Networks |
IJRECS/V-5/I-1/30 |
|
Tumati Jagadeesh, V. Lingamaiah, Dr. M. Janga Reddy |
31. |
Assure Provenance: The Necessity of Bread and Butter of Data Forensics in Cloud
Ciphering |
IJRECS/V-5/I-1/31 |
|
Architha Bellamkonda, Venu Babu |
32. |
Shared Ascendancy Utilizing Privacy Preserving and Certification Protocol in
Cloud Computing |
IJRECS/V-5/I-1/32 |
|
Gowsiya Shaik, V. Padmaja, Sayeed Yasin |
33. |
A Review on Secure Data Aggregation Techniques of Wireless Sensor Networks |
IJRECS/V-5/I-1/33 |
|
B. M. Daya Kumar, N. Sarath Babu |
34. |
A Burden Adjusting Model Based on Cloud Dividing for the Unfastened Cloud |
IJRECS/V-5/I-1/34 |
|
Baby Pravallika Velineni, M. Rao Batchanaboyina |
35. |
Binocular Integration Behaviors for Quality Assessment of Stereoscopic 3D Image
Compression |
IJRECS/V-5/I-1/35 |
|
B. Maheshwari, M. Raja Kumari |
36. |
Improved for Protection Point with Conceivable Arrangements in Cloud Processing |
IJRECS/V-5/I-1/36 |
|
G. Sai Sindhura, K. Praveen Kumar |
37. |
Secured Access to Encrypted Cloud Databases |
IJRECS/V-5/I-1/37 |
|
Valluru Baby Vasanthi, Sudhakar Vecha |
38. |
Communication Protocols Purely Secured Based on Authenticated Location Services in Mobile Networks |
IJRECS/V-5/I-1/38 |
|
Parimisetti Saidarao, S. S. Radha |