

Table of Contents
Articles
Setting up based Private Cloud Using Open Stack |
PDF
![]() |
D. Anish Nirmal, K. Arunkumar, V. Girish, R. Arunkumar | 177-182 |
Power Conservation Target Tracking in Sensor Network Using Sleep Scheduling |
PDF
![]() |
S. Sathis Kumar, A. Suresh Kumar | 183-187 |
SVM Based Network Traffic Classification Using Correlation Information |
PDF
![]() |
R.S. Anu Gowsalya, S. Miruna Joe Amali | 188-192 |
Review of MANET: Applications & Challenges |
PDF
![]() |
Manpreet Singh, Malti Sarangal, Gurpreet Singh | 193-197 |
Effective Privacy Preserving In Leakage Upper Bound Constraints Using Cloud |
PDF
![]() |
S. Hemalatha, S. AlaudeenBasha, N. Premkumar | 198-201 |
Data Security and Privacy in Cloud Using RC6 and SHA Algorithms |
PDF
![]() |
O.M. Soundararajan, Y. Jenifer, S. Dhivya, T.K.P. Rajagopal | 202-205 |
An Enhanced Security Algorithm for Data Transmission in Cloud Computing |
PDF
![]() |
P. Suganthi, E. Mahalakshmi | 206-209 |
Privacy-Preserving in Public Auditing for Secure Cloud |
PDF
![]() |
G. Balamurugan, S. Alaudeen Basha, T. Parthiban | 210-212 |
Prevention of Wormhole and Blackhole Attacks by Detecting Wormhole Nodes Using Countermeasure with AHP |
PDF
![]() |
A. Ayisha Parveen, M. Saithun Bushra, M. Islabudeen | 213-217 |

This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616