International Journal of Computer
Trends and Technology
Entrenched Visual Cryptography using Secret Sharing Scheme with public Key
Kode Phani Kumar, B.VeeraMallu A
Contrast Enhancement Using Bi-Histogram Equalization With Brightness Preservation
Gowthami Rajagopal, K.Santhi
Zone Divisional Network with Double Cluster Head for effective communication in WSN
Sandeep Verma, Kanika Sharma
Secure web mining framework for e-commerce websites
M.Karthik , S.Swathi
An Efficient Cloud Storage with Secure Dynamic Data Modification
K.HariPriya, P.Krishnamoorthy
Review of First Hop Redundancy Protocol and Their Functionalities
Priyanka Dubey, Shilpi Sharma, Aabha Sachdev
Resource Provisioning Cost of Cloud Computing by Adaptive Reservation Techniques
M.Manikandaprabhu, R.SivaSenthil
Advanced Replica-Based Data Access Prediction and Optimization Approach in Distributed Environment
P. Sathiya, K. N. Vimal Shankar
Cryptoviral Extortion: A virus based approach
S.Manoj Kumar, M.Ravi Kumar