1.INTRUSION DETECTION AND AUTHENTIC IDENTIFICATIONS THROUGH THE KEYS DISCLOSURE APPROACH IN THE WIRELESS SENSOR NETWORKS
Authors : A.Senthil kumar,Dr.K.Ravikumar
Paper Id :IJCRCST-OCTOBER16-01
Page No : 1026-1029
2.ANALYSIS OF RSA SEURITY ARCHITECTURE IN WIRELESS SENSOR NETWORK
Authors : S.Sasipriya,R.Umamaheswari
Paper Id :IJCRCST-OCTOBER16-02
Page No : 1030-1034
3.A STUDY ON CLOUD COMPUTING AND DATA STORAGE COMPRESSIONS
Authors : V.Sherine Vargheese,Dr.D.Maruthanayagam
Paper Id :IJCRCST-OCTOBER16-03
Page No : 1035-1041
4.AN ANALYSIS ON THE INITIATIVES OF COGNITIVE COMPLEXITY METRICS IN OBJECT ORIENTED PROGRAMMING: A SURVEY
Authors : N. Vijayaraj,T.N.Ravi
Paper Id :IJCRCST-OCTOBER16-04
Page No : 1042-1045
5.STUDY ON COVERAGE PROBLEMS IN WIRELESS SENSOR NETWORKS
Authors : N.Vijayarani,Dr.A.Senthilkumar
Paper Id :IJCRCST-OCTOBER16-05
Page No : 1046-1051
6.ICT IN ADVANCED EDUCATION FOR THE 21ST CENTURY: ICT AS CHANGE SPECIALISTS FOR INSTRUCTION
Authors : Dr I. Lakshmi
Paper Id :IJCRCST-OCTOBER16-06
Page No : 1052-1056