Menu

Category: Volume2_Issue1

A Greedy Algorithm Approach for Mobile Social Network

SushantKumar ,ManuK.Yadav ,ReshmaPawar ,MadhuriPati Read Documents

SecurityUsingBiometricsTemplateAndVisual Cryptography:ATwoFoldApproach

SushantKumar ,ManuK.Yadav ,ReshmaPawar ,MadhuriPati Read Documents

Finding Nearest Neighbors For Route Sharing On Android Platform

Rupal Newaskar , Utkarsh Bagade , Karishma Ramachandran , Abhay Ahire Read Documents

Secure Sharing Of Data in Cloud Computing With Secret Sharing Algorithm

Abhishek Chandan , Sahadev Gupta ,RichaKumari ,VrindaRajan,Shubhangi Sonone Read Documents

PROCESS MINING BY USING EVENT LOGS

Swapnali B.Sonawane, Prof.Ravi P. Patki Read Documents

Securing And Maintaining PrivacyInformation Brokering In Distributed DataSharing

Swapnil P. Jahagirdar SanketDivate , PratapGhayal , SaurabhMamidwar , MayurNarawade ,Meghna Lokhande Read Documents