ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Computer Science and Mobile Applications IJCSMA >>

Vol.2, No.1

Publisher: ZAIN Publications

Publishing Date: 2014-01-30

  1. Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

    Authors: P. Selvigrija, D. Sumithra

  2. PACKET LOSS MAINTENANCE USING PUZZLE-LOGIC ALGORITHM IN WIRELESS SENSOR NETWORKS

    Authors: R.Vijayakumar, G.Rajasekar, E.K.Deepanchakkaravarthi

  3. A Novel Scheme for Live Streaming Evolution Networks

    Authors: Mr.U.Saravanakumar, Mr.S.Dilip kumar

  4. RBM: Rule Based Lexical Meaning Extraction in Video Data Using Fuzzy

    Authors: Mr.A.Julius Ceaser, Mr.S.Rajesh

  5. BIOMETRIC AUTHENTICATION SYSTEM USING FINGER VEIN

    Authors: Mr.T.Thirumal Valavan, Ms.R.Kalaivani

  6. PRIVACY PROTECTION AGAINST WORMHOLE ATTACKS IN MANET

    Authors: Mr.B.Satheeshkumar, Ms.R.Kalaivani

  7. OBJECT TRACKING AND RECOGNITION FOR REAL TIME VIDEOS USING NAIVE ? BAYES CLASSIFICATION

    Authors: KAVITHA.A, K.THULASIMANI

  8. GPSR GEOGRAPHICAL ROUTING PROTOCOL USING MANET

    Authors: Mr.T.Hari Shankar, Mr.S.Dilip Kumar

  9. Securing Sensitive Information in Social Network Data Anonymization

    Authors: Mr. A.Stalin Irudhaya Raj, Ms. N.Radhika

  10. PROXY RE-ENCRYPTION USING HYBRID ENCRYPTION SCHEME SECURE AGAINST CHOSEN CIPHERTEXT ATTACK

    Authors: N.Veeraragavan, Mr.S.Rajesh

  11. HIDING PACKET SEND THROUGH MULTIPLE TRANSMISSION LINE BY VIRTUALLY IN AD HOC

    Authors: N. MOHAMED BAYAS, Mr. S.Rajesh

  12. Diagnostic Group Socio Behaviors Using Dim Extractions

    Authors: Mr. M. Namasivayam, Ms. N. Radhika

  13. OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS

    Authors: G. Vijayanand, R. Muralidharan

  14. Anti-Phishing Framework for Banking Based on Visual Cryptography

    Authors: Mr.K.A.Aravind, Mr.R.MuthuVenkataKrishnan

  15. Security Analysis of Visual Secret Sharing Scheme

    Authors: Mr.M.Venkatesh, Mr.S.Rajesh

  16. Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

    Authors: Dhanarasan P, Gopi S

  17. PART-BASED PEDESTRIAN DETECTION AND TRACKING USING HOG-SVM CLASSIFICATION

    Authors: Miss. A. Sanofer Nisha, Mrs. K. Thulasimani

  18. EFFICIENT INCENTIVE COMPATIBLE MODEL FOR SECURE DATA SHARING

    Authors: Ms. Dhanalakshmi.M, Mrs.Siva Sankari.E

  19. COLLECTION OF WEB OPINION INFORMATION AND VISUALIZATION BASED ON SDC

    Authors: Mr.R.Rajasekaran, Mr.S.Rajesh