Archived Papers for Journal
International Journal of Computer Science and Mobile Applications IJCSMA >>
Vol.2, No.1
Publisher: ZAIN Publications
Publishing Date: 2014-01-30
- Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud StorageAuthors: P. Selvigrija, D. Sumithra
- PACKET LOSS MAINTENANCE USING PUZZLE-LOGIC ALGORITHM IN WIRELESS SENSOR NETWORKSAuthors: R.Vijayakumar, G.Rajasekar, E.K.Deepanchakkaravarthi
- A Novel Scheme for Live Streaming Evolution NetworksAuthors: Mr.U.Saravanakumar, Mr.S.Dilip kumar
- RBM: Rule Based Lexical Meaning Extraction in Video Data Using FuzzyAuthors: Mr.A.Julius Ceaser, Mr.S.Rajesh
- BIOMETRIC AUTHENTICATION SYSTEM USING FINGER VEINAuthors: Mr.T.Thirumal Valavan, Ms.R.Kalaivani
- PRIVACY PROTECTION AGAINST WORMHOLE ATTACKS IN MANETAuthors: Mr.B.Satheeshkumar, Ms.R.Kalaivani
- OBJECT TRACKING AND RECOGNITION FOR REAL TIME VIDEOS USING NAIVE ? BAYES CLASSIFICATIONAuthors: KAVITHA.A, K.THULASIMANI
- GPSR GEOGRAPHICAL ROUTING PROTOCOL USING MANETAuthors: Mr.T.Hari Shankar, Mr.S.Dilip Kumar
- Securing Sensitive Information in Social Network Data AnonymizationAuthors: Mr. A.Stalin Irudhaya Raj, Ms. N.Radhika
- PROXY RE-ENCRYPTION USING HYBRID ENCRYPTION SCHEME SECURE AGAINST CHOSEN CIPHERTEXT ATTACKAuthors: N.Veeraragavan, Mr.S.Rajesh
- HIDING PACKET SEND THROUGH MULTIPLE TRANSMISSION LINE BY VIRTUALLY IN AD HOCAuthors: N. MOHAMED BAYAS, Mr. S.Rajesh
- Diagnostic Group Socio Behaviors Using Dim ExtractionsAuthors: Mr. M. Namasivayam, Ms. N. Radhika
- OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLSAuthors: G. Vijayanand, R. Muralidharan
- Anti-Phishing Framework for Banking Based on Visual CryptographyAuthors: Mr.K.A.Aravind, Mr.R.MuthuVenkataKrishnan
- Security Analysis of Visual Secret Sharing SchemeAuthors: Mr.M.Venkatesh, Mr.S.Rajesh
- Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETsAuthors: Dhanarasan P, Gopi S
- PART-BASED PEDESTRIAN DETECTION AND TRACKING USING HOG-SVM CLASSIFICATIONAuthors: Miss. A. Sanofer Nisha, Mrs. K. Thulasimani
- EFFICIENT INCENTIVE COMPATIBLE MODEL FOR SECURE DATA SHARINGAuthors: Ms. Dhanalakshmi.M, Mrs.Siva Sankari.E
- COLLECTION OF WEB OPINION INFORMATION AND VISUALIZATION BASED ON SDCAuthors: Mr.R.Rajasekaran, Mr.S.Rajesh