INTERNATONAL JOURNAL FOR RESEARCH ON ELECTRONICS AND COMPUTER SCIENCE (VOLUME -
5, ISSUE - 5)
S.NO |
TITLE OF MANUSCRIPT |
ARTICLE ID |
DOWNLOAD |
1. |
Distributed Access Control in Clouds: Ensured and Efficient Access to Outsourced Data |
IJRECS/V-5/I-5/01 |
|
Sara Fatima, D. Thirupathi |
2. |
An Enhanced Qos-Oriented Distributed Protocol with Neighbor Node Selection for Hybrid Wireless Networks |
IJRECS/V-5/I-5/02 |
|
Anireddy Saikumar Reddy, N. Sateesh |
3. |
Secure and Dynamic Audit Free Mechanism for Attribute Based Encryption in Cloud |
IJRECS/V-5/I-5/03 |
|
Chandana Gurijala, J. V. S. Arundathi, Injam Narasimharao |
4. |
A Novel XML Keyword Search Mechanism for Different Contexts in Xml Data |
IJRECS/V-5/I-5/04 |
|
Polishetty Priyanka, R. Suresh, Injam Narasimha Rao |
5. |
A Survey of Ranking Fraud Detection using Opinion Mining for Mobile Apps
|
IJRECS/V-5/I-5/05 |
|
Vemula Jaswanthi, M. Shailaja, Dr. M. V. Siva Prasad |
6. |
A Survey on Proximity Aware of P2P File Sharing Systems Using Interest Clustering |
IJRECS/V-5/I-5/06 |
|
E. Srilekha, P. Ashok Kumar, John Babu |
7. |
Public and Private Cloud Based Security Using Redundancy Elimination of Hybrid Cloud Approach |
IJRECS/V-5/I-5/07 |
|
Sangisetty Swathi, M. Shailaja, Dr. M. V. Siva Prasad |
8. |
A Survey on Quality of Service in Cloud Computing Using Guaranteed Profit Maximization |
IJRECS/V-5/I-5/08 |
|
Pendem Annapurna , Y. Laxmi Prasanna , Dr. M. V. Siva Prasad |
9. |
A Review on Regenerating Code Using Privacy Preserving Cloud Storage in Cloud Computing |
IJRECS/V-5/I-5/09 |
|
Mallarapu Navya, Y. Laxmi Prasanna, Dr. M. V. Siva Prasad |
10. |
An Approach for P2P Systems using Dependable Computational Dynamic Trust Model |
IJRECS/V-5/I-5/10 |
|
P. Ashok Kumar, Vusirikayala Sandhyarani |
11. |
Video Traffic in Wireless Multi hop Networks by using Distortion-Resistant Routing Framework |
IJRECS/V-5/I-5/11 |
|
Kandula Mounika, Y. Laxmi Prasanna, Dr. M. V. Siva Prasad |
12. |
A Secured Communication in Multi Agent Systems Using Dynamic Trust Computation Mode |
IJRECS/V-5/I-5/12 |
|
Deekonda Priyanka, M. Supriya Menon, Injam Narasimharao |
13. |
SPrivacy Circles: Sharing Images on Social Networking Sites Using A3P |
IJRECS/V-5/I-5/13 |
|
Shaik Chashmi Fathima, Dr. H. Venkateshwar Reddy |
14. |
Agglomerative Clustering of Feature Subset Selection Algorithm on High Dimensional Data |
IJRECS/V-5/I-5/14 |
|
Avantika Penumarty, Dr. P. Prapoorna Roja, Dr. P. Krishna Subba Rao |
15. |
Tracking and Characterizing Eye Gaze in Desktop Environment Using Web Camera |
IJRECS/V-5/I-5/15 |
|
Ch. Sandeep Kumar, V. Pradeep |
16. |
Analysis of Wireless Sensor Networks over Secure Data Aggregation in Collusion Attack |
IJRECS/V-5/I-5/16 |
|
Ch. Hyma, G. Ravali, Dr. M. V. Siva Prasad |
17. |
Efficient Approach for Keyword Queries in XML Data with Performance Analysis |
IJRECS/V-5/I-5/17 |
|
N. Siva Kumar, P. Sandeep Reddy, Dr. M. V. Siva Prasad |
18. |
Privacy Preserving and Preventing Stealthy Denial of Service in Cloud Computing |
IJRECS/V-5/I-5/18 |
|
Maddineni Akhila, Mudusu Rambabu |
19. |
A Hybrid Approach for Opinion Targets ad Opinion Words Extraction of Reviews on Word Alignment Model |
IJRECS/V-5/I-5/19 |
|
S. Venkatesh, P. Niranjan Kumar, Dr. M. V. Siva Prasad |
20. |
Enhanced Security System in Cloud for Multimedia Content Protection |
IJRECS/V-5/I-5/20 |
|
D. V. Himaja, U. Veeresh |
21. |
Fully Anonymous Attribute-Based Encryption for Control Cloud Data Access Privilege and Anonymity |
IJRECS/V-5/I-5/21 |
|
N. Mounika, D. Jayanarayana Reddy |
22. |
A Study on Scalable Distributed Service Integrity for Software-as-a-Service Clouds |
IJRECS/V-5/I-5/22 |
|
C. Anusha, I. V. Vijaya Lakshmi, R. Anil Kumar |
23. |
A Survey on Enhancing the Performance and Accuracy for Secure Cloud Transactions |
IJRECS/V-5/I-5/23 |
|
C. Kavitha Sree, I. V. Vijaya Lakshmi, C. Uma Shankar |
24. |
Detection of Ranking Fraud in Real Time Mobile Applications |
IJRECS/V-5/I-5/24 |
|
S. Bindu Madhuri, K. Lakshmi, Dr. V. V. Venkata Ramana |
25. |
A Survey on Relational Data by using Robust and Reversible Watermarking Technique |
IJRECS/V-5/I-5/25 |
|
G. Mercy Vimala, P. Kiran Rao, R. Sandeep Kumar |
26. |
Distributed Provable Data Possession in Multi-Cloud Environment |
IJRECS/V-5/I-5/26 |
|
R. Bindhu, U. Veeresh |
27. |
An Effective Keyword Search Scheme Optimization for SQL in Databases |
IJRECS/V-5/I-5/27 |
|
C. Vijay Kumar, P. Andrews Himakiran |
28. |
An Adaptive Based Approach by Content Sharing Websites for User Data and Images |
IJRECS/V-5/I-5/28 |
|
Patil Jhansi, R. Varaprasad, K. Tarakeswar |
29. |
A User Authorization Based on Context Aware Secure Authentication Framework |
IJRECS/V-5/I-5/29 |
|
Gattigundla Deepthi, J. Vijaya Sree, Dr. M. V. Siva Prasad |