Volume 1, Issue 01 of July 2014


 

S.No

 

Title & Authors Details

 

Paper ID

 01.

 

By Applying Data Allocation Strategies and Guilt Model Analysis to Find Data Leakage Detection

Authors: KomalSurandase, PriyankaJadhavPallaviJadhav , AaratiPatil

IJIRIS-SHP1

 02.

 

Authentication schemes for session password using color and special characters

Authors: Rohit Jagtap1, Vaibhav Ahirrao2, Vinayak Kadam3, Nilesh Aher4

IJIRIS-SHP2

 03.

 

Preventing Private Information Leakage from Social Networks

Author: K.Nagendran

IJIRIS-SHP3

 

 04.

 

Velocity Estimation Of An Object Moving In UWSN Using Reverse Localization Scheme

Author: B.Mohanapriya

 IJIRIS-SHP4

 05.

 

  IJIRIS-SHP5

    06.

Implementation of Least-Latency Routing over Time-Dependent Wireless Sensor Networks

Author: Manju Priya G

  IJIRIS-SHP6
    07.

A Comparative Study of Network Bandwidth Allocation protocols for DataCenter Networks in cloud.

Authors: B Gayathri Kamath* , Dr.RameshBabu H S

  IJIRIS-SHP7
    08.

EMAP: Expedite Message Authentication Protocol for VANETs

Author: Bhagyashree .R

  IJIRIS-SHP8
    09.

RACISM Prevention in Data Mining

Author: S. P. Santhoshkumar

  IJIRIS-SHP9
    10.

IDS alert analysis using clustering & Artificial Neural Network

Authors: Nanaso S. Bansode* , Thaksen J. Parvat   
 IJIRIS-SHP10
    11.

Position Based Energy-Efficient Protocol for Mobile Ad-hoc Networks

Authors: Dr. S.K. Mahendran

     ISJY10011
    12.

Location Privacy in Vehicular Ad Hoc Networks 

Authors: N.K.Prema, Dr.A.Arul Lawrence S.K

     ISJY10120
    13.

SECURITY STUDY OF FACTION COMMUNICATION IN WIRELESS NETWORKS

Authors: Rajashekara H.G , Dr.A.Arul Lawrence S.K 
     ISJY10121