International Journal of Science and Research (IJSR)
Computer Science
Downloads: 121 | Views: 502
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1034 - 1037A Survey on Self-Destruction of Data Using Active Storage
Avinash P. Khadse | Prof. Pravin D. Soni
Downloads: 121 | Views: 589
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1038 - 1043Honeypots: Approach and Implementation
Kumar Shridhar | Mayank Jain
Downloads: 121 | Views: 524
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1315 - 1316Literature Survey on a NVSS Scheme for Sharing Digital Secret Image
Nasla K
Downloads: 121 | Views: 496
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1984 - 1987Automatic VOE Techniques using CRF and Visual Saliency Method
Dr. Swathi. K | Sivabalan.T | Vijayanathan.R
Downloads: 121 | Views: 612
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 123 - 126VANET: A Survey on Secure Routing
Omkar Shete | Sachin Godse
Downloads: 121 | Views: 575
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 402 - 409WBANs for Patient Monitoring Systems: A Survey and Outlook
Nikhil Walke | R.K. Bedi
Downloads: 121 | Views: 448
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 415 - 419A Survey on Different Existing Technique for Detection of Black Hole Attack in MANETs
Heta Changela | Amit Lathigara
Downloads: 121 | Views: 463
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 433 - 436Study of Detection and Prevention Techniques for Flooding attack on AODV in MANET
Shruti Bhalodiya | Krunal Vaghela
Downloads: 121 | Views: 450
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 735 - 739Comparative Analysis of Privacy Preserving Techniques in Distributed Database
Sapana Anant Patil | Dr. Abhijit Banubakode
Downloads: 121 | Views: 503
Computer Science & Engineering, India, Volume 4 Issue 1, January 2015
Pages: 942 - 946Efficient Resource Utilization through Sensor Virtualization
Monali G. Sonule | Prof. Swati Nikam