International Journal of Science and Research (IJSR)
Computer Science
Downloads: 115 | Views: 526
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 873 - 876Analysis of Password based Multi-server Authentication Schemes
Swati Nema | Anamika Soni
Downloads: 115 | Views: 572
Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 764 - 767Fuzzy and Rough Set Theory Based Gene Selection Method
C. Kalaiselvi | Dr. G. M. Nasira
Downloads: 115 | Views: 554
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2878 - 2880Detection & Prevention of DDoS and Flooding Attacks in Ad hoc Network
P. D. Kadam | R.M.Khaire
Downloads: 115 | Views: 541
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2816 - 2818The Survey Paper on Filter Unwanted Messages from Walls and Blocking Non-legitimate Users in OSN
Pallavi Shinde | Trupti Gedam
Downloads: 115 | Views: 499
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2677 - 2680Survey of Novel Method for Online Classification in Data Mining
Jadhav Bharat S | Gumaste S.V.
Downloads: 115 | Views: 505
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2558 - 2561A Survey Paper on Muti-Hop Privacy-Aware Data Aggregation in Mobile Sensing
D. N. Rewadkar | Asmita D. Abhyankar
Downloads: 115 | Views: 585
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2415 - 2421Implementation of One Time Pad Cipher with Rail Fence and Simple Columnar Transposition Cipher, for Achieving Data Security
Jawad Ahmad Dar | Sandeep Sharma
Downloads: 115 | Views: 428
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2407 - 2410Survey of Clustering Schemes in Mobile Ad hoc Networks
Amit Savyanavar | Mohini Borate
Downloads: 115 | Views: 510
Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 1318 - 1323Towards Keyword Based Recommendation System
Vinaya B. Savadekar | Pramod B. Gosavi
Downloads: 115 | Views: 669
Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 314 - 317Vampire Attack: Energy Efficient Trust Based Solution
Pritam M. Channawar | Dr. Y. V.Chavan