S. No |
Paper Title |
Paper ID |
Download |
01. |
A Novel Approach for Secure Authorized Deduplication in Hybrid Cloud
T.Sri Lakshmi,Dr.Syed Sadat Ali
|
IJDCST/01/V-3/I-5/02 |
|
02. |
Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism
V.Yamini,Dr.Syed Sadat Ali
|
IJDCST/01/V-3/I-5/03 |
|
03. |
Granting Distinct Access Levels to Encrypted Cloud Databases
P.Anusha,Dr.Syed Sadat Ali
|
IJDCST/01/V-3/I-5/04 |
|
04. |
Scalable and secured TPA auditing for dynamic cloud storage systems with preserved privacy
S.Sandeep Kumar,Dr.K.Vijaya Lakshmi,Dr.Rishi Sayal
|
IJDCST/01/V-3/I-5/05 |
|
05. |
Protocol Level Proven Methods to mitigate the Vampire Attacks on Wireless Sensor Networks
Avula Srikanth,R.V.Kishore Kumar
|
IJDCST/01/V-3/I-5/06 |
|
06. |
An Efficient and Scalable Multi-signature Iterative Generalized Least-Squares for Hidden Data Extraction
Panchumarthy Bhaskar,S.Suresh Babu
|
IJDCST/01/V-3/I-5/07 |
|
07. |
Reliable Minimum Energy Cost Routing (RMECR) to improve the Lifetime in Wireless Ad Hoc Networks
T.Sai Priyanka,M.Amith Rajan,Dr.J.V.N.Ramesh
|
IJDCST/01/V-3/I-5/14 |
|
08. |
Scalable and Efficient Conditional Shortest Path Routing (SECSPR) for Delay Tolerant Networks
B.Mrudhula,G.Manthru Naik
|
IJDCST/01/V-3/I-5/15 |
|
09. |
A Study on Differential Query Services in Cost–Efficient Clouds
L.Jyothsna,M.Samba Siva Rao
|
IJDCST/01/V-3/I-5/19 |
|
10. |
Providing Distinguish Access Levels to Encrypted Cloud Databases
R.Padmaja,G.Syam Prasad
|
IJDCST/01/V-3/I-5/20 |
|
11. |
Select Multi-keyword Ranked Search over Encrypted Cloud Data
Anudeep.M,YVVN Vara Prasad
|
IJDCST/01/V-3/I-5/21 |
|
11. |
A Survey on Security issues in cloud computing
D.Anil Kumar,Y.Manasa
|
IJDCST/01/V-3/I-5/23 |
|
12. |
Advanced Chameleon Algorithm for feature selection
Adavi Sridurga,S.Suresh Babu
|
IJDCST/01/V-3/I-5/24 |
|
13. |
Hybrid and rapid algorithms for Association rule mining
Srinivasa Rao Kongarana,V.Kamakshi Prasad
|
IJDCST/01/V-3/I-5/27 |
|