Frequency : 12 issues per year
Subject : Computer Applications and Technology
ISSN : 2319–8656 (Online)
91) |
Implementation of Matrix based Mapping Method Using Elliptic Curve CryptographyPages 312 - 317Geetha G Padmaja Jain10.7753/IJCATR0305.1008
|
92) |
A Recapitulation of Data Auditing Approaches for Cloud DataPages 329 - 332Poonam Dabas Divya Wadhwa10.7753/IJCATR0306.1002
|
93) |
Data Retrieval from the Discrete Media Available on Web and its Diversified Employment PerspectivesPages 345 - 348Kulvinder Singh Sanjeev Dhawan Pratibha10.7753/IJCATR0306.1005
|
94) |
Effective Parameters of Image Steganography TechniquesPages 361 - 363Fariba Ghorbany Beram10.7753/IJCATR0306.1009
|
95) |
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsPages 364 - 369Kamini Nalavade Dr. B. B. Meshram10.7753/IJCATR0306.1010
|
96) |
Parallel Implementation of Travelling Salesman Problem using Ant Colony OptimizationPages 385 - 389Gaurav Bhardwaj Manish Pandey10.7753/IJCATR0306.1015
|
97) |
A Review on ?Privacy Preservation Data Mining (PPDM)Pages 403 - 408Dwipen Laskar Geetachri Lachit10.7753/IJCATR0307.1003
|
98) |
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMPages 415 - 419Neha, Abhinav Bhandari10.7753/IJCATR0307.1005
|
99) |
Comparative Analysis of Quality of Service for Various Service Classes in WiMAX Network using NS-3Pages 427 - 433Gaurav Sharma Rishma Chawla10.7753/IJCATR0307.1007
|
100) |
Classification with No Direct DiscriminationPages 464 - 468Deepali P. Jagtap10.7753/IJCATR0307.1014
|