INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME -
5, ISSUE - 4)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Significance of Security on Execution in a VoIP Network |
IJRECS/V-5/I-4/01 |
|
Annavajjula Dinesh, Potla Sreedhar |
2. |
Outsourcing of Multi Copies of Replicated Data in Cloud using Efficient Integrity Verification |
IJRECS/V-5/I-4/02 |
|
P. Ashok Kumar, Amaraneni Swathi |
3. |
Intelligence Based Secure Cloud Storage Using Identity Based Ring Signature |
IJRECS/V-5/I-4/03 |
|
P. Ashok Kumar, A. Praveen Kumar, Bandla Priyanka |
4. |
A Distributed Dynamic Approach for High-Dimensional Data Using Cluster Based FAST Algorithm |
IJRECS/V-5/I-4/04 |
|
V. Srinivas, B. Raghavalli, Pooja Srivastava |
5. |
An Improved Privacy Policy Inference of User Data and Images with Annotation Process
|
IJRECS/V-5/I-4/05 |
|
M. Chaithanya, M. Ramesh, K. Nikitha, B. Satish |
6. |
A Robust Model for Data Security Using Threshold Cryptography in Cloud Computing |
IJRECS/V-5/I-4/06 |
|
Daddala Yaso Omkari, Karnam Balaji, Karamala Suresh |
7. |
A Novel Hybrid Approach for Spatial Query on Multi Dimensional Data Using Fast Nearest Neighbor Search |
IJRECS/V-5/I-4/07 |
|
Sayeed Yasin, Fathima Thabasum Khan |
8. |
Enhanced Utility Preservation Using Data Utility and Micro Aggregation |
IJRECS/V-5/I-4/08 |
|
P. Ashok Kumar, G. Sandhya Rani, Narapogu Kavitha |
9. |
A Novel Test Packet Generation Using Network Monitoring |
IJRECS/V-5/I-4/09 |
|
B.V.V.S. Prasad, Morla Nagalakshmi |
10. |
Survey Paper on Detection of Epileptic Spikes |
IJRECS/V-5/I-4/10 |
|
P. L. Kadam, A. P. Mane |
11. |
A Novel Virtual Resource Renting Approach using Maximization of Profit in Cloud Computing |
IJRECS/V-5/I-4/11 |
|
P. Ashok Kumar, Gugulothu Anusha |
12. |
A Distributed Novel Approach for Anonymous Encrypted Cloud Data Using Multi Keyword Ranked Search |
IJRECS/V-5/I-4/12 |
|
Vedavyas J, B. Vijaya Bhaskar Reddy, Narra Sukhender Reddy |
13. |
Secure Tweet Segmentation for Named Entity Recognition Using Targeted Twitter Stream |
IJRECS/V-5/I-4/13 |
|
Bandari Ravi kiran, H. Tejeswini, Narra Sukhender Reddy |
14. |
A Distributed Approach for Privacy Preserving Ranked Search for Encrypted Data in Cloud Computing |
IJRECS/V-5/I-4/14 |
|
Venkatesulu. S, H. Tejeswini, Narra Sukhender Reddy |
15. |
A Survey on Spectral Clustering Application through Affinity Propagation |
IJRECS/V-5/I-4/15 |
|
A. T. Sathyanarayana Reddy, M. N. Bhaskar, Narra Sukhender Reddy |
16. |
A Survey on Detection and Prevention Techniques of SQL Injection Attacks |
IJRECS/V-5/I-4/16 |
|
O. Bhaskar, K. Lalitha |
17. |
An ULSI Implementation of SOC Architecture with Scan Test Bandwidth Capability |
IJRECS/V-5/I-4/17 |
|
Anulasya Veeravalli, Nava Jeevan Raju, Ayesha Tarannum |
18. |
A Novel Distributed Approach of Pattern Classifiers under Attack Using Security Evaluation |
IJRECS/V-5/I-4/18 |
|
J. Swarupa Rani, B. Siva Vishnu Mohan Reddy, G. Pratap |
19. |
Adaptive Privacy Policy Prediction System for Uploaded Images on Social Sites |
IJRECS/V-5/I-4/19 |
|
Prathigadapa Sireesha |