International Journal of Science and Research (IJSR)
Computer Science
Downloads: 130 | Views: 496
Computer Science & Engineering, India, Volume 5 Issue 5, May 2016
Pages: 514 - 520An Efficiently Subcontracted the Identity-Based Encryption for Revocation in Cloud Computing
Soujanya M A | Lalitha L A
Downloads: 130 | Views: 551
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 235 - 238Personalized and Real-Time Data Oriented Disease Inferring System
Rasla Azeez | Anju C R
Downloads: 130 | Views: 506
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 342 - 344Survey on Providing Security and Authentication for Devices to Achieve QOS in IOT
Mudassar M. Shaikh | Prof. V. V. Jog
Downloads: 130 | Views: 480
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 872 - 877NoSQL in Action - A New Pathway to Database
Priya Badlani
Downloads: 130 | Views: 503
Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 878 - 881A Review on Various Approaches of Data Security in Cloud Computing
Gurbachan Singh | Amandeep Kaur
Downloads: 130 | Views: 541
Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1608 - 1614Optimizing Data Misuse Detection by Identifying Guilty Agent without Causing Disturbance and Inconvenience to Trusted Agent
Sangramsinh Deshmukh
Downloads: 130 | Views: 396
Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 903 - 904Extracting Medical Health Records in a Graph Based Approach
Dr. K. Nachimuthu
Downloads: 130 | Views: 493
Computer Science & Engineering, India, Volume 5 Issue 9, September 2016
Pages: 205 - 207Surv?y on ?v?lu?tion of F?ci?l ?xpr'ssions
Dr. Snthil Rgvn V K
Downloads: 130 | Views: 516
Computer Science & Engineering, India, Volume 5 Issue 11, November 2016
Pages: 959 - 962Survey on Privacy Preserving in Social Networks
S. Mayil | Dr. M. Vanitha
Downloads: 130 | Views: 593
Computer Science & Engineering, India, Volume 6 Issue 1, January 2017
Pages: 173 - 176Overview of Security Mechanisms and Attacks in Wireless Sensor Networks
Priyanka Sharma