IJPTT - Volume 5 - Issue 3 - 2015
S.No
|
Title/Author Name
|
Paper ID
|
1
|
Secure Data in cloud computing using encryption algorithms |
IJPTT-V18P401
|
2
|
Fuzzy Logic Based Technique Using Trust Authentication for a Secure Data Exchange in Wireless Sensor Networks |
IJPTT-V18P402
|
3
|
Peer selection technique for efficient searching and streaming in P2P network |
IJPTT-V19P401
|