1 |
Volume 8 |
Issue 5 |
Potential Operation of Elliptic Curvature Cryptography for Safety Improvement |
UdhayaKumar.A, RaviKumar.K |
|
2 |
Volume 8 |
Issue 5 |
Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks |
Ranjini.P, Kathireasan.V |
|
3 |
Volume 8 |
Issue 5 |
Reliable Multicast Multi-Path Data Delivery In Wireless Ad Hoc Networks Using Time Standard Packet Allocation Scheme |
Shanmugasundhram.A.P, Chandrasekar.C |
|
4 |
Volume 8 |
Issue 5 |
Medical Data Mining :An Expert Diagnostic For Dermatological Diseases |
Manjusha.K.K , Shankaranarayanan.K, Seena.P |
|
5 |
Volume 8 |
Issue 5 |
An Efficient Mechanism For Providing Identity Privacy For Bulk Cloud Information Sharing With Diffserv Architecture On Cloud Infrastructure |
Durairaj.M, Chandrasekar.C |
|
6 |
Volume 8 |
Issue 5 |
Distributed Protocal For Privacy-Preserving By Applying Proposed K-Anonymizing Approach On Distributed Data Sets |
Padmapriya,.G, Hemalatha.M |
|