Abstract: Mobile ad hoc networks (MANETs) plays an important role in the communication in the networkmust be set up temporarily and quickly. Since the nodes move randomly routing protocols must bring strong andcons...
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...
Abstract: The load Balancing in the network is a severe problem in network. The data created in wirelessnetwork is kept on node. It accessed over geographic hash table. The geographic hash table is used to recoverd...
Abstract : This paper is a collection of q analogue of various classical methods for finding solutions of algebraic and transcendental equations. It also deals with comparing classical methods with q methods proposed by...
Online Social Networks (OSNs) are today one of the most popular interactive medium to share,
communicate, and distribute a significant amount of human life information. In OSNs, information filtering can a...
EP ID EP104451
DOI -
Views 79
Downloads 0
How To Cite
Sowmya. D (2013). Cryptographic Cloud Storage with Hadoop Implementation. IOSR Journals (IOSR Journal of Computer Engineering), 13(5),
14-20. https://europub.co.uk/articles/-A-104451
Sign In Europub
For faster login or register use your social account.
Overview of Improving Robustness of MAODV Protocol byCombining Tree and Mesh Structures
Abstract: Mobile ad hoc networks (MANETs) plays an important role in the communication in the networkmust be set up temporarily and quickly. Since the nodes move randomly routing protocols must bring strong andcons...
Intent Search and Centralized Sybil Defence Mechanism for Social Network
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an...
A Survey on Balancing the Network Load Using GeographicHash Tables
Abstract: The load Balancing in the network is a severe problem in network. The data created in wirelessnetwork is kept on node. It accessed over geographic hash table. The geographic hash table is used to recoverd...
Numerical Analogy of q-Function
Abstract : This paper is a collection of q analogue of various classical methods for finding solutions of algebraic and transcendental equations. It also deals with comparing classical methods with q methods proposed by...
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Based Technique
Online Social Networks (OSNs) are today one of the most popular interactive medium to share, communicate, and distribute a significant amount of human life information. In OSNs, information filtering can a...