ICETSST-2017 - Part 3
Research Article |
Data Protection Scheme For Cloud Computing Using Attribute And Policy Encryption
Dr. V.VENKATESA KUMARV. KAVITHA, Dr. M.NEWLIN RAJKUMAR
Research Article |
An Efficient Data Sharing Approach for Dynamic Group in Cloud
J.SelvaNithya, Mrs.A.Brunda
Research Article |
KEY BASED SECURE DATA TRANSMISSION OVER THE NETWORK
A.AROKIA ROSELINE, R.BALA KIRETHIGA, G.GEETHA, K.GOWSIKA
Research Article |
Particle Swarm Optimization Based Feature Selection and Summarization of Customer Reviews
B.Suganya, V.Priya
Research Article |
Deceiving Brute Force Attack
Dr. M. Thangavel, Dr. G. Lalli, Dr. J. Vandarkuzhali, Ms. K. S. Saratha
Research Article |
Secure and Reliable Routing using PSO optimization
Amali Angel Punitha, S.Anu Priya, P.Tharani and S.Priyadharshini