DISTRIBUTED KEY POLICY FOR STORED DATA IN CLOUDS USING
KP – ABE ALGORITHM
Authors: 1MS.YEDIDA SUBHA SREE, 2MR.M.S.VENU GOPALA RAO
Doi:
|
1-6 |
|
|
EVALUATING THE PERFORMANCE OF IMAGE ENCRYPTION ALGORITHM BY USING BLOCK BASED SYMMETRIC TRANSFORMATION
ALGORITHM
Authors: POLAMURI VIJAYA LAKSHMI, M.TILAK
Doi:
|
7-12 |
|
|
A BREIF STUDY ON TESTING OF NATERGM MODEL IN DYNAMIC
SOCIAL MEDIA NETWORKS
Authors: PARAMATA SOWJANYA, M.S.VENUGOPALA RAO
Doi:
|
13-21 |
|
|
TRACKING THE PRIVACY AND SECURITY OF ONLINE SOCIAL
NETWORKS FOR PHOTO SHARING
Authors: KOMMULA M R N V DURGARAO, M.S.VENUGOPALA RAO
Doi:
|
22-27 |
|
|
DEVELOPMENT OF READABILITY AND SECURITY OF THE CAPTCHA
DESIGN
Authors: KOLA NEELAKANTESWARA RAO, K.N.VENKATESWARA RAO
Doi:
|
29-33 |
|
|
SCALABLE AND EFFICIENT MULTICOPY DYNAMIC DATA POSSESSION
Authors: KALLAKURI DURGA SAI SWETHA, N.SRINIVASA RAO
Doi:
|
34-40 |
|
|
OPTIMIZATION OF QUALITY SERVICES IN CLOUD COMPUTING USING
PROFIT MAXIMIZATIO TECHNIQUE
Authors: KADALI SATYA VENKATA DURGA TULASI, M.TILAK
Doi:
|
41-49 |
|
|
EXPLOITING THE EFFICIENCY OF FILE SHARING USING REPLICATION
IN P2P FILE
Authors: GUTHULA MAHALAKSHMI PRASANNA, CH.N.D.CHAMUNDESWARI
Doi:
|
50-54 |
|
|
ENHANCING THE SECURITY OF INTERNET SERVICES THROUGH
CONTINIOUS MULTILEVEL ARCHITECTURE
Authors: GEDELA KOMALI DEVI, M.S.VENUGOPALA RAO
Doi:
|
55-62 |
|
|
RECOMMENDATION SYSTEM WITH SOFT COMPUTING
METHODOLOGIES
Authors: DR. D. ESHWAR
Doi:
|
63-68 |
|
|
ANALYSIS OF A BATTERY ENERGY STORAGE SYSTEM BASED DYNAMIC VOLTAGE RESTORER
Authors: MS. K.CHETASWI
Doi:
|
69-75 |
|
|
ANALYSIS ONLABOUR WELFARE MEASURES IN
SINGARENI COLLIERIES COMPANY LIMITED
Authors: 1DR. K. ANIL KUMAR, 2P.BUELA PRASANNA KUMARI
Doi:
|
76-81 |
|
|
Development of Huffman Encoder For MPEG-2 Video Applications
Authors: Dr.Tumu Srinivas Reddy, Dr N.Subbu Lakshmi
Doi: .
|
82-86 |
|
|
Ethernet Verification Using OVM
Authors: Dr.K.Rajender Prasad, Nagulanchi Raju
Doi: .
|
87-93 |
|
|