S. No Paper Title Paper ID Download
01. Slicing Micro data Publishing’s using Zealous Algorithm Poola Durga Bhavani,A.Sudarshan Reddy IJDCST/01/V-2/I-8/01
02. Dynamic Image Search Using CBIR Processes Tejaswi Dhanekula,P R Krishna Prasad IJDCST/01/V-2/I-8/02
03. Multipath routing protocols since Wireless Ad Hoc to Mesh Networks a review Kusuma Boyapati,K.Suresh Kumar IJDCST/01/V-2/I-8/03
04. Annotation of data for the Web Databases search resultsP.Sudheer Kumar,Balvindersingh Bondili IJDCST/01/V-2/I-8/04
05. Privacy Preserving Public Auditing for Data in Cloud StorageM.Raja Sekhar,Rehana Begum IJDCST/01/V-2/I-8/05
06. Location Proof Updating System with Collusion ResistancePatan Sathar Khan,Shaik Khamarjahan IJDCST/01/V-2/I-8/06
07. Privacy preserving Cloud assisted Mobile Health Monitoring ServicesPolavarapu.Sridevi,Guntapalli Minni IJDCST/01/V-2/I-8/07
08 Innovative Security measures Employing Cryptography as well as LSB Coordinating SteganographyCH.Subba Rao,G.J.Suuny Deol IJDCST/01/V-2/I-8/08
9. Level of privacy preserving in addition to Public Auditing Support for Information Storage employing RSA inside Cloud ProcessingA.Siva Sankar,G.J.Suuny Deol IJDCST/01/V-2/I-8/09
10. Energetic Resource Allocation Using Virtual Products for Cloud Computing EnvironmentP.Subhani,V.Kesav Rao IJDCST/01/V-2/I-8/10
11. Collaborating conclusive Data control pertaining to Ethics Proof using RSA within Multi-Cloud Storage devicesL.Kalpana,MD.Sirajuddin IJDCST/01/V-2/I-8/11
12. Supporting Service Owner-Controlled Placement Directives Using Cloud ServicesMs.K.Subhasri,Mr.D.Hari Krishna IJDCST/01/V-2/I-8/15
13. Systematic Analysis for Cloud MigrationMs.Shaik.Salma Asiya Begum,Mr. P.Radha Krishna IJDCST/01/V-2/I-8/16
14. Commitment Processing Applications Development in Operating SystemKanduru Nischel,Krishna Kanth Tammana,Kurapati Yuva Pavan IJDCST/01/V-2/I-8/18
15. Dynamic Security Applications for Detecting DDOS AttacksSubhani Sayyed,Smt.SK.M.Almas IJDCST/01/V-2/I-8/22
16. Dynamic Security Operations in Online Social Networks Using GPPrabhu Kiran.N,Prasad IJDCST/01/V-2/I-8/23
17. Cloud Supported Enhanced Secure Remote Health MonitoringNakkala Ajay Babu,S.Rama Krishna IJDCST/01/V-2/I-8/24
18. Incorporation of Meta Cloud in CSPs to Solve Vendor Lock-In ProblemsShaik Ismail Jabeebulla,S.Rama Krishna IJDCST/01/V-2/I-8/25
19. Sophisticated Mobile-Healthcare Emergency Based On Opportunistic Computing Framework Incorporating Secure and Privacy Preserving MechanismPotteti Sandhya Rani,S.Rama Krishna IJDCST/01/V-2/I-8/26
20. Vampire Attacks: Improvised Mechanism For Controlling Strenuous Life From Wireless Ad-Hoc Sensor NetworksPrabhu Kiran.N,Prasad IJDCST/01/V-2/I-8/27
21. Improvised Protection in Secure Cloud Storage Using Public Appraisal MechanismSudheer Mundra,G.Prasuna IJDCST/01/V-2/I-8/28