IJPTT - Volume 5 - Issue 3 - 2015
S.No
|
Title/Author Name
|
Paper ID
|
1
|
Secure Data in cloud computing using encryption algorithms
|
IJPTT-V18P401
|
2
|
Fuzzy Logic Based Technique Using Trust Authentication for a Secure Data Exchange in Wireless Sensor Networks
|
IJPTT-V18P402
|
3
|
Peer selection technique for efficient searching and streaming in P2P network
|
IJPTT-V19P401
|