Volume-16 Number-7 Oct 2014

S.No
Title/Author Name
Ref. No
61

Privacy Mining of Association Rules in Transversal Shared Databases

- TammineniKrushnam Raju , Ramesh kumar behara

 

IJETT-V16P261
62

An Empirical Model of Intrusion Detection System with ID3 Classification

- PavitraGunna , K. Prasada Rao

 

IJETT-V16P262
63

A Frequent Pattern based Search Implementation for User Search Goals

- A.Shanti Rani , Vijaya Bhrathi

 

IJETT-V16P263
64

A Novel Re-Authentication Scheme on Cloud Based Storage Services

- T.G.V.V.Srinivas , P.Suresh Babu

 

IJETT-V16P264
65

A Hybrid Approach for Efficient Communication in Wireless Sensor Networks

- K.DurgaBhavani , K.Srinivasa Rao

 

IJETT-V16P265
66

An Efficient Privacy Preserving Mining in Decentralized Architecture

- S.Gayatri , S.Kalyani

 

IJETT-V16P266
67

Classification of Transitional Data Sets for Secrecy Conserving over Cloud

- Hemanth Kumar Mamidi , JayanthiRao Madina

 

IJETT-V16P267
68

Secrecy Conserving of Association Rule Mining from Unrealized Transaction Data Base Using Bipartite Matrix

- Gangu. Dharma Raju , Jayanthi Rao Madina

 

IJETT-V16P268
69

Peer to Peer Message Verification and source security in Ad-Hoc network

- Madhavi Perla , Behara Vineela

 

IJETT-V16P269
70

Anonymous User Verification of Digital Signature Schema for Data Stored In Cloud

- Parvathi Jalli , Ramesh kumar behara

 

IJETT-V16P270