91)
Implementation of Matrix based Mapping Method Using Elliptic Curve Cryptography
Pages 312 - 317
Geetha G Padmaja Jain

10.7753/IJCATR0305.1008

Show Preview
  |  
PDF
92)
A Recapitulation of Data Auditing Approaches for Cloud Data
Pages 329 - 332
Poonam Dabas Divya Wadhwa

10.7753/IJCATR0306.1002

Show Preview
  |  
PDF
93)
Data Retrieval from the Discrete Media Available on Web and its Diversified Employment Perspectives
Pages 345 - 348
Kulvinder Singh Sanjeev Dhawan Pratibha

10.7753/IJCATR0306.1005

Show Preview
  |  
PDF
94)
Effective Parameters of Image Steganography Techniques
Pages 361 - 363
Fariba Ghorbany Beram

10.7753/IJCATR0306.1009

Show Preview
  |  
PDF
95)
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Pages 364 - 369
Kamini Nalavade Dr. B. B. Meshram

10.7753/IJCATR0306.1010

Show Preview
  |  
PDF
96)
Parallel Implementation of Travelling Salesman Problem using Ant Colony Optimization
Pages 385 - 389
Gaurav Bhardwaj Manish Pandey

10.7753/IJCATR0306.1015

Show Preview
  |  
PDF
97)
A Review on ?Privacy Preservation Data Mining (PPDM)
Pages 403 - 408
Dwipen Laskar Geetachri Lachit

10.7753/IJCATR0307.1003

Show Preview
  |  
PDF
98)
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHM
Pages 415 - 419
Neha, Abhinav Bhandari

10.7753/IJCATR0307.1005

Show Preview
  |  
PDF
99)
Comparative Analysis of Quality of Service for Various Service Classes in WiMAX Network using NS-3
Pages 427 - 433
Gaurav Sharma Rishma Chawla

10.7753/IJCATR0307.1007

Show Preview
  |  
PDF
100)
Classification with No Direct Discrimination
Pages 464 - 468
Deepali P. Jagtap

10.7753/IJCATR0307.1014

Show Preview
  |  
PDF