ANONYMOUS DATA SHARING WITH FORWARD SECURITY FOR VERIFICATION PROCESS M.KAMARUNISHA Article Full Text
DYNAMIC SEARCHABLE OVER ENCRYPTED CLOUD DATA FOR MULTI KEYWORD RANKED SEARCH SCHEME P.ANITHA Article Full Text
OPTIMAL POWER CONTROL AND RELIABLE COMMUNICATION FOR MOBILE NETWORK THROUGH EFFICIENT ROUTING PROTOCOL M.KAMARUNISHA Article Full Text
DETECTING AND RESOVING ANOMALIES USER ANALYSIS ON FIREWALL POLICY IN SENSOR NETWORKS R.JOTHI Article Full Text
SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN LARGE NETWORKS USING ATTRIBUTES BASED ENCRYPTION G.DEEPA Article Full Text
A BANKER’S CHEQUE USING ATM INTERFACED WITH TRUSTED THIRD PARTY SERVER M.KAMARUNISHA Article Full Text
MINIMIZING SERVER BURDEN USING VIRTUAL MACHINE MIGRATION PROBABILITY IN CLOUD COMPUTING ENVIRONMENTS P.ANITHA Article Full Text
A NOVEL APPROACH FOR EFFICIENT USAGE OF INTRUSION DETECTION SYSTEM IN MOBILE AD HOC NETWORKS M.KAMARUNISHA Article Full Text
DENIABLE ATTRIBUTE BASED ENCRYPTION SYSTEM IN AN AUDIT-FREE CLOUD STORAGE A.SIVASANKARI Article Full Text
DISTRIBUTED OUTSOURCING Dt UNAUTHORIZED USING UN TRUSTED AGENTS PREDICTION USING WEB APPLICATION G.DEEPA Article Full Text