Issue Details

Volume 2 | Issue 6 | june | 2016

Paper # Paper Title/ Authors Download Paper Downloads View Search
ijrretas20 Sturdy Reversible Watermarking Using Composite Technique With Emboss Filter
Tejaswita Salunkhe, Chhaya Nayak
Page No. : 1-4

Cite/ Export Certificate
37 View Paper google
ijrretas21 Result Evaluation for Optimized Resource Management Decision System (ORM-DS) for Distributed Infrastructure Management in Cloud Computing
Ms. Nandini kranti , Mr. Anand Singh Rajawat
Page No. : 1-4

Cite/ Export Certificate
39 View Paper google
ijrretas22 Survey On Content Base Information Retrieval Technique with Hybrid Nature
Divyata Patil, Rasna Sharma
Page No. : 1-4

Cite/ Export Certificate
41 View Paper google
ijrretas23 Outlier Detection in Data Streams Using Fuzzy C-Mean Clustering, Outlier Detection and Genetic Algorithm
Bhavana Tiwari, Abhishekh Tiwari
Page No. : 1-7

Cite/ Export Certificate
32 View Paper google
ijrretas24 Multidimensional Association Rule Generation on sequence database using Hybrid Approach
Swapnil Bari, Pawan Parmar
Page No. : 1-7

Cite/ Export Certificate
32 View Paper google
ijrretas25 Detection and Prevention for Jamming Attack in MANET using TAODV Protocol
Soneram verma, Prof. Maya Yadav
Page No. : 1-4

Cite/ Export Certificate
25 View Paper google
ijrretas26 Password authentication using AES and SHA in Cloud Environment for two Servers
Mrunal Nikam, Chhaya Nayak
Page No. : 1-5

Cite/ Export Certificate
20 View Paper google
ijrretas27 IMPLEMENTATION TECHNIQUE FOR SECURITY IN OUTSOURCING OF DATA BASE
Islam Patel, Sunil Patel
Page No. : 1-4

Cite/ Export Certificate
19 View Paper google
ijrretas28 Implement Encryption Using Improved CP-ABE System To Achieve data Confidentiality
Shweta Patil, Chhaya Nayak
Page No. : 1-5

Cite/ Export Certificate
30 View Paper google
ijrretas29 IMPLEMENTATION TECHNIQUE FOR SECURITY IN OUTSOURCING OF DATA BASE
Islam Patel, Sunil Patel
Page No. : 1-4

Cite/ Export Certificate
16 View Paper google
ijrretas30 Comparison between Different key sizes of AES on cloud computing
Nitin Rajput, M.Tech Scholar
Page No. : 1-6

Cite/ Export Certificate
26 View Paper google
ijrretas31 Performance Evaluation of AES With Different Key Size on Cloud Computing
Nitin Rajput, M.Tech Scholar
Page No. : 1-5

Cite/ Export Certificate
15 View Paper google
ijrretas32 Power Saving Clustering Algorithm For Communication Of Wireless Sensor Network
Ajay Bisen , Ankita R.Mowar
Page No. : 1-4

Cite/ Export Certificate
22 View Paper google