Published: Feb 2, 2022

SECURITY ENHANCEMENT FOR ACCESS CONTROL SYSTEMS BY USING DYNAMIC AUTHENTICATION

464-471 M.P. Aarthi, S.M. Karpagavalli

OPTIMAL BINARY DATA FUSION FOR DISTRIBUTED DETECTION IN WIRELESS SENSOR NETWORKS

472-479 F. Jessy Nirmala, K. P. Porkodi

EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING

480-487 R. Sangeetha, K. Mubarak Ali

TEXT MINING-BASED SIMILARITY MEASURE FOR COLLABORATIVE POLICY ADMINISTRATION

488-494 P. Vidhya Rohini, A. Sudha

CLOUD BASED MULTIFACTOR AUTHENTICATION FOR PERSONAL HEALTH RECORD

495-500 S.Roobini, V.Shivaganeshan, B.Swathi, S.Vidya

EFFICIENT TRANSITIVE REGION APPROACH FORSHORTEST PATH DISCOVERY IN RDBMSS USING MINIMUM SPANNING TREE

501-504 M.Helen Freda, S.Prema

CONTROLLING PATTERN ATTACKS AGAINST ANOMALY BASED CLASSIFICATION

505-511 S. Kalpana, V. Saravanakumar

MULTI PARTY DATA DISTRIBUTION AND RULE MINING WITH PRIVACY

512-519 K. K. Kavishree, A. N. Karthikeyan

CLOUD DATA SHARING SERVICES WITH PUBLIC VERIFIER

520-527 M. Nithiya, A. N. Karthikeyan

AN APPROACH TO CLUSTER DOCUMENTS FOR IMPROVING COMPUTER INSPECTION IN DIGITAL FORENSIC ANALYSIS

528-532 S.Padma Sudha, S.Prema

ROUGH OUTLIER AGENT BASED EFFICIENT QUERY SERVICES ON CLOUDS

533-539 E. Saranya, C. Gayathri

AN EFFICIENT CLIENT AUTHENTICATION MECHANISM FOR REMOTE SERVICE PROVIDERS

540-547 B. Yugadharini, S. Lalithambikai

SECURED DEDUPLICATION MECHANISM UNDER CLOUD BACKUP SERVICES

555-562 V. Gandhimathi, M. Shanthamani

SEARCHING ON ENCRYPTED DOCUMENTS UNDER CLOUDS

563-569 S. Keerthiga, S. Savitha Karpagam