Indexing
Latest News

Welcome to Research Publish Journals, Please submit your paper at submit.rpj@gmail.com

Vol 3 Issue 2 April 2015-June 2015

International Journal of Computer Science and Information Technology Research (IJCSITR)

Downloads Complete Paper

Restore Bin: Restoration on Android Device

Vol 3 Issue 2 April 2015-June 2015

Ankita Gaikwad, Sonali Wilfred, Swapnali Shinde, Sweta Mandal, Prof. Sunil Rathod

Dependable Privacy Protection for End To End Gesture Recognition Based On Dynamic Key Changes

Vol 3 Issue 2 April 2015-June 2015

M.Pradeepa, J.Sangeethaguil, P.Nivetha, R.Karthika

Grid Computing

Vol 3 Issue 2 April 2015-June 2015

Nishitha Mummareddy

Scope of Enhanced Network Security

Vol 3 Issue 2 April 2015-June 2015

BODLA. SHESHANAG

Threat of Cyber Attack and Network Security DoS Attack Analysis and New Preventing Method

Vol 3 Issue 2 April 2015-June 2015

Takamasa Nakayama, Tarik Eltaeib

Data Hiding In Encrypted H.264/AVC Video Streams By Codeword Substitution

Vol 3 Issue 2 April 2015-June 2015

Mr. Ratnakar Kumbhar, Mr. Sagar Yamgar, Ms. Rupali Ghule

Similarity among Android Applications by GUI Feature Extraction

Vol 3 Issue 2 April 2015-June 2015

Amit Kumar, Vishal Verma

Virtual Private Network Security

Vol 3 Issue 2 April 2015-June 2015

Umesh Chandra Reddy Nomula

On Demand Automation Testing On Cloud Infrastructure and Application

Vol 3 Issue 2 April 2015-June 2015

Nilesh Bhimani, Mr. M. Arul Prakash

Spot Pricing and Revenue Maximization Using Dynamic Cloud Pricing

Vol 3 Issue 2 April 2015-June 2015

SUSHMA DODDAMETI

Authenticated Deduplication System with Access Control and Security Measures

Vol 3 Issue 2 April 2015-June 2015

Anu George, Mr. Sandeep Hegde

Traffic Diagnosis for Encrypted Messaging Services: Whatsapp, Apple Imessage and Many More

Vol 3 Issue 2 April 2015-June 2015

Sumanth Reddy Devi Reddy, Prof Tarik El Taeib

A Survey of Routing Protocol in Mobile Adhoc Networks

Vol 3 Issue 2 April 2015-June 2015

Sharath Gade, Tarik El Taeib

Algorithm for Keyword Search on an Execution Path

Vol 3 Issue 2 April 2015-June 2015

Adarsh Pandiri, Tarik Eltaeib

Ensuring Data Storage Security in Cloud Computing

Vol 3 Issue 2 April 2015-June 2015

Khushboo Chauhan


‹ First78910111213