1 |
Extended Alternate Heterogeneous Earliest Finish Time Algorithm |
Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-09. |
National |
2 |
Internet Protocol Security (IPSec) |
Proceedings of the 95th session of Indian Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-25. |
National |
3 |
Evaluating the Effectiveness of Personalized Web Search |
AICTE Sponsored National Conference on – High Performance Computing and Networking,13th-14th August 2011, Rajampet, Andhra Pradesh, India. |
National |
4 |
Password Authentication using Context-Sensitive Associative Memory Neural Networks: A Novel Approach |
Proceedings of Springer Lecture Notes of the LNICST-85 Series, part-II, pp. 464–478 at the CCSIT 2012, in January 2012 held at Bangalore, India. |
National |
5 |
Protocol Sensor Based Embedded Technique for Efficient Water-Saving Agriculture |
Proceedings of ACNCN2012 conference on advances in communication, navigation and computer networks 17th -18th March, 2012, A.U, Visakhapatnam. |
National |
6 |
A Multi Cloud based Approach to Enhance data Security and Availability in Cloud Storage |
Proceedings of International Conference on ComNet CIIT & ITC 2013, pp.58-63. (Published by Elsevier, with ISBN 978-81-910691-6-3), Organized by ACEEE, in Hyderabad from 08th -09th November 2013. |
International |
7 |
Analysis of Cyber-Criminal Profiling and Cyber-Attacks: A Comprehensive study |
3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). |
International |
8 |
An Innovative Progress Approach for Quantity Mining of item sets |
3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). |
International |
9 |
An Integrated Approach to Provide Security and Resist Thefts on Digital Data |
3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). |
International |
10 |
Cloud Forensics: The Need and Challenges A Research & Fact Compendium |
3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). |
International |
11 |
Implementation of X.509 Attribute Certificates for Cloud Environments |
3rd World Conference on Applied Sciences, Engineering & Technology 27th -29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). |
International |
12 |
A Unified Model for Cherishing Privacy in Database System: An Approach to Overhaul Vulnerabilities |
First International Conference on Networks & Soft Computing,2014, organized by Vignan’s Foundation for Science, Technology & Research, Guntur, with the Technical Sponsorship of IEEE Hyderabad Section during 19th -20th August 2014(ISBN-978-1-4799-3486-7/14). |
International |
13 |
Enhanced DES Algorithm |
International Conference on Recent Trends and Research Issues in Computer Science and Engineering, held during 02nd – 03rdMay 2015. |
International |
14 |
Information Security using Genetic Algorithm with Penultimate and Least Significant Bits |
Fifth International Conference on Advances in Information Technology and Mobile Communication – AIM 2015, held during 11th -12th July 2015, Bangalore, India. |
International |
15 |
MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity Thefts |
4th World Conference on Applied Sciences, Engineering & Technology 24-26 October 2015, Kumamoto University, Japan (ISBN13:978-81-930222-1-4). |
International |
16 |
Accelerating SQL Queries by Unravelling Performance Bottlenecks in DBMS Engine |
IEEE International Conference on Energy Systems and Application (ICESA – 2015) 30th October to 01st November 2015, DYPIET Pimpri, Pune India. |
International |