Open Access
Subscription or Fee Access
Table of Contents
Articles
An Effectual Integrity Verification with Reliable Mass Data Storage Scheme in Cloud Computing | |
S.R. Nayana, G. VenifaMini, J.Jeya A Celin | 147-152 |
VM Inclusive MeBaSA for Virtualized Multi-tier Cloud | |
Ramesh D. Kodi, M. Balavaishnavi | 153-162 |
Efficient Resource Provisioning using RTUOP Algorithm in Cloud Computing | |
M. Revatheeswari, P. Saranya | 163-167 |
Paper Framework for Power Aware Scheduling in Cloud Environment | |
Abdul Nasar Kaipancherry, Dr.K. Najeeb | 168-174 |
An Enhanced Framework Model for Secure Key Management in Stream Control Transmission Protocol | |
P. Venkadesh, Dr.Julia Punitha Malar Dhas, S.V. Divya | 175-181 |
Source Layer Group Aggregation for Balanced Traversing | |
S.T. Padmapriya, J. Deepika | 182-189 |
A Hierarchical Attribute BASED Technique for Bendy and Scalable Access in Cloud Computing | |
K. Bhuvaneshwari, O.G. Harini Vardhan | 190-194 |
Implementing ABSM Protocol for VANET | |
M.S. Bagavathiammal, P. Sivaraman | 195-199 |
Penalty Model for SLA Architecture in Cloud | |
S. Absa, Shajulin Benedict | 200-206 |
A Novel Approach for Load Balancer in SIP Clusters | |
K. Anandhan, V.K. Dinesh Prabu, Dr.C. Kumar | 207-213 |
Network Reconfiguration of Distribution System Using Harmony Search Algorithm | |
T.D. Sudhakar | 214-221 |
Securing Information using Cryptography and Steganography Technique | |
V. Hemanth, Mahammad Shareef | 222-226 |
Improving Security and Verifiability of Stored Data in Cloud | |
N.H. Rajesh, Dr.S. Nagarajan | 227-231 |
This work is licensed under a Creative Commons Attribution 3.0 License.
ISSN: 0974 – 9616