Publications Data 2015 1. Anurag Singh Tomar Et.Al
Publications Data 2015 1. Anurag Singh Tomar et.al, "Image based Authentication with Secure Key Exchange Mechanism in Cloud", Medical Imaging, m-Health and Emerging Communication Systems (MedCom), 2014 International Conference, Issue : 1 , 2015 2. Shekhar Verma et.al, "Arduino Based Smart RFID Security and Attendance System with Audio Acknowledgement", International Journal Of Engineering Research & Technology (IJERT), volume : 4, Issue : 1 , 2015 3. Ketki Arora et.al, "Security of Data in Cloud Environment Using DPaas", IJMER, volume : 5, Issue : 1 ,8, 2015 4. Gaurav Kumar Tak et.al, "Comparative Analysis of Various Attacks on MANET", International Journal of Computer Applications, volume : 111, Issue : 12 ,42-46, 2015 5. Varun Singla et.al, "Big Data: Tools and Technologies in Big Data", International Journal of Computer Applications, volume : 112, Issue : 1 ,0975 – 8887, 2015 6. Isha et.al, "Analysis of Enhanced Request Response Detection Algorithm for Denial of Service attack in VANET: A Review", International Journal of Computer Science and Information Technologies (IJCSIT), volume : 6, Issue : 1 ,678-681, 2015 7. Isha et.al, "Analysis of Hybrid GPSR and Location Based Routing Protocol in VANET", International Journal of Computer Science and Information Technologies (IJCSIT), volume : 6, Issue : 1 ,674- 677, 2015 8. Nidhi Sethi et.al, "Synthesis, Characterization and Anti microbial activity of protected dipeptides and their deprotected analogs", Oriental Journal of chemistry, volume : 31, Issue : 1 , 2015 9. Rohitt Sharma et.al, "A Survey of Various Image Enhancement Methods on Different Types of Images", INTERNATIONAL JOURNAL OF COMPUTER SCIENCES AND ENGINEERING, volume : 3, Issue : 1 , 2015 10. Aditya Khamparia et.al, "Adaptive E-Learning Based Udutu System For Object Oriented Programming", International Journal of Applied Engineering Research, volume : 10, Issue : 1 ,1439-1442, 2015 11.
[Show full text]