S. No Paper Title Paper ID Download
01. A Novel Approach for Secure Authorized Deduplication in Hybrid Cloud T.Sri Lakshmi,Dr.Syed Sadat Ali IJDCST/01/V-3/I-5/02
02. Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism V.Yamini,Dr.Syed Sadat Ali IJDCST/01/V-3/I-5/03
03. Granting Distinct Access Levels to Encrypted Cloud Databases P.Anusha,Dr.Syed Sadat Ali IJDCST/01/V-3/I-5/04
04. Scalable and secured TPA auditing for dynamic cloud storage systems with preserved privacy S.Sandeep Kumar,Dr.K.Vijaya Lakshmi,Dr.Rishi Sayal IJDCST/01/V-3/I-5/05
05. Protocol Level Proven Methods to mitigate the Vampire Attacks on Wireless Sensor Networks Avula Srikanth,R.V.Kishore Kumar IJDCST/01/V-3/I-5/06
06. An Efficient and Scalable Multi-signature Iterative Generalized Least-Squares for Hidden Data Extraction Panchumarthy Bhaskar,S.Suresh Babu IJDCST/01/V-3/I-5/07
07. Reliable Minimum Energy Cost Routing (RMECR) to improve the Lifetime in Wireless Ad Hoc Networks T.Sai Priyanka,M.Amith Rajan,Dr.J.V.N.Ramesh IJDCST/01/V-3/I-5/14
08. Scalable and Efficient Conditional Shortest Path Routing (SECSPR) for Delay Tolerant Networks B.Mrudhula,G.Manthru Naik IJDCST/01/V-3/I-5/15
09. A Study on Differential Query Services in Cost–Efficient Clouds L.Jyothsna,M.Samba Siva Rao IJDCST/01/V-3/I-5/19
10. Providing Distinguish Access Levels to Encrypted Cloud Databases R.Padmaja,G.Syam Prasad IJDCST/01/V-3/I-5/20
11. Select Multi-keyword Ranked Search over Encrypted Cloud Data Anudeep.M,YVVN Vara Prasad IJDCST/01/V-3/I-5/21
11. A Survey on Security issues in cloud computing D.Anil Kumar,Y.Manasa IJDCST/01/V-3/I-5/23
12. Advanced Chameleon Algorithm for feature selection Adavi Sridurga,S.Suresh Babu IJDCST/01/V-3/I-5/24
13. Hybrid and rapid algorithms for Association rule mining Srinivasa Rao Kongarana,V.Kamakshi Prasad IJDCST/01/V-3/I-5/27