logo

Vol. 4, No. 2, August 2014

Back to previous page

 

Serial #
Title
Page

001

Effective & Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing

51-54
Author: Areeba Tauseef, Manas Gupta, Ashi Varshney, Ankit Agarwal, Manish Gupta

002

Study of Semantic Search Procedure

55-59
Author: Sonali Saxena, Mohak Gupta, Naman Garg, Piyush Ratnam, Priyanka Goel

003

A Survey on Techniques for Privacy Preserving Data Publishing (PPDP)

60-64
Author: Amita Sharma, Puneeta Panday, Ranjan Baghel, Praveen Saini

004

Performance Comparison of Distance Routing Effect Algorithm for Mobility (DREAM) and On-Demand Distance Vector (AODV) Routing Protocols

65-69
Author: Shivi Rastogi, Sanjay Singh Bisht, Rachit Katyal, Manoj Kumar Singh

005

Solving TSP by using IWD Algorithm

70-72
Author: Vikas Kumar Mittal, Komal Verma, Anshika Goyal

006

A Hybrid Video Watermarking Scheme for Protection of Ownership Under Multiple Cascading Attacks

73-77
Author: Himanshu Agarwal, Manoj Kr Singh, Anurag Panday, Puneet Kumar

007

A Layered Approach to Perform Preventive Selfish Node Routing in MANET

78-81
Author: Surbhi, Neeti Kashyap

008

SURVEY: Techniques for Aging Problems in Face Recognition

82-88
Author: Aashmi, Sakshi Sahni, Sakshi Saxena

009

Biometric Authentication Using Argyle Technique

89-92
Author: Soumya Dixit, Richa Saxena, Nayanika Singh

 

 

Copyright 2018 All Rights Reserved.