Issue Details
Volume 2 | Issue 6 | june | 2016
| Paper # | Paper Title/ Authors | Download Paper | Downloads | View | Search |
|---|---|---|---|---|---|
| ijrretas20 |
Sturdy Reversible Watermarking Using Composite Technique With Emboss Filter
Tejaswita Salunkhe, Chhaya Nayak
|
37 | View Paper |
| |
| ijrretas21 |
Result Evaluation for Optimized Resource Management Decision System (ORM-DS) for Distributed Infrastructure Management in Cloud Computing
Ms. Nandini kranti , Mr. Anand Singh Rajawat
|
39 | View Paper |
| |
| ijrretas22 |
Survey On Content Base Information Retrieval Technique with Hybrid Nature
Divyata Patil, Rasna Sharma
|
41 | View Paper |
| |
| ijrretas23 |
Outlier Detection in Data Streams Using Fuzzy C-Mean Clustering, Outlier Detection and Genetic Algorithm
Bhavana Tiwari, Abhishekh Tiwari
|
32 | View Paper |
| |
| ijrretas24 |
Multidimensional Association Rule Generation on sequence database using Hybrid Approach
Swapnil Bari, Pawan Parmar
|
32 | View Paper |
| |
| ijrretas25 |
Detection and Prevention for Jamming Attack in MANET using TAODV Protocol
Soneram verma, Prof. Maya Yadav
|
25 | View Paper |
| |
| ijrretas26 |
Password authentication using AES and SHA in Cloud Environment for two Servers
Mrunal Nikam, Chhaya Nayak
|
20 | View Paper |
| |
| ijrretas27 |
IMPLEMENTATION TECHNIQUE FOR SECURITY IN OUTSOURCING OF DATA BASE
Islam Patel, Sunil Patel
|
19 | View Paper |
| |
| ijrretas28 |
Implement Encryption Using Improved CP-ABE System To Achieve data Confidentiality
Shweta Patil, Chhaya Nayak
|
30 | View Paper |
| |
| ijrretas29 |
IMPLEMENTATION TECHNIQUE FOR SECURITY IN OUTSOURCING OF DATA BASE
Islam Patel, Sunil Patel
|
16 | View Paper |
| |
| ijrretas30 |
Comparison between Different key sizes of AES on cloud computing
Nitin Rajput, M.Tech Scholar
|
26 | View Paper |
| |
| ijrretas31 |
Performance Evaluation of AES With Different Key Size on Cloud Computing
Nitin Rajput, M.Tech Scholar
|
15 | View Paper |
| |
| ijrretas32 |
Power Saving Clustering Algorithm For Communication Of Wireless Sensor Network
Ajay Bisen , Ankita R.Mowar
|
22 | View Paper |
|
IJRRETAS