Volume-17 Number-6 Nov 2014

S.No
Title/Author Name
Ref. No
51

A Novel Message Integrity Code Based Authentication Protocol

- ChittiRameshkumar, RameshKumar behara

 

IJETT-V17P251
52

A Prototype of Rekeying Method Using Recursive Map Theory

- S.Sairam, M.satyanarayana

 

IJETT-V17P252
53

A Manageable Framework for Preserving Exclusive Data in Social Networks

- A.v.swathi, C.P.V.N.J Mohan Rao

 

IJETT-V17P253
54

Privacy Data Sharing for a Group of Members in the Cloud

- YaragallaSarat Babu, JayanthiRao Madina

 

IJETT-V17P254
55

Secure and Efficient Data Transaction over Cloud Based On Signature Generation Technique

- GundaSowjanya, V.Lakshmiprasad

 

IJETT-V17P255
56

A Framework for Secure Data Sharing over Cloud Based on Group Key Management

- GinjupalliUmamaheswari, Behara Vineela

 

IJETT-V17P256
57

An Improved Pixel Transpose Technique over Images

- Menda.VasudhaRani, JayanthiRao Madina

 

IJETT-V17P257
58

An Efficient User Search Results with Hybrid Evolutionary Approach

- Bodana Gnaneswari, Ch.Sunil

 

IJETT-V17P258
59

A Simple and Efficient Unique Identity Based Verification in Networks

- GiriBabu Pitchika, Mula.Sudhakar

 

IJETT-V17P259
60

Human Face Recognition using Elman Networks

- V.Ramya, V.Kavitha, P.Sivagamasundhari

 

IJETT-V17P260