1.EXPLORING SECURITY USING ONE TIME DYNAMIC PERSUASIVE CUED CLICK POINT
Authors : Charles Vijay,R.Saranya
Paper Id :IJCRCST-JUNE16-01
Page No : 785 – 788
2.ADVANCED DATA MINING FOR XML QUERY ANSWERING SUPPORT
Authors : N.Saritha,M.Aruna
Paper Id :IJCRCST-JUNE16-02
Page No : 789 – 792
3.UTILIZING RATELESS CODES IN CLOUD STORAGE SYSTEMS
Authors : M.P.Farha Jamal,M.Aruna
Paper Id :IJCRCST-JUNE16-03
Page No : 793 – 798
4.SEMANTIC SIMILARITY BASED INSTANCE MATICHING ACROSS HETEROGENUS WEBSITES
Authors : S.Revathi,N.Poongothai
Paper Id :IJCRCST-JUNE16-04
Page No : 799 – 803
5.A NOVEL REMOTE AUTHENTICATION VIA ENHANCED BIOMETRICS THROUGH INTERNET
Authors : T.Sathya,T.Krishnan,T.Laksmanakumar
Paper Id :IJCRCST-JUNE16-05
Page No : 804 – 808
6.ONLINE CLASS IMBALANCE LEARNING BASED ON USER PREFERENCE
Authors : R.Vaishnavi,N.Poongothai
Paper Id :IJCRCST-JUNE16-06
Page No : 809 – 814
7.STUDY ON TRUST BASED AD-HOC ON-DEMAND DISTANCE VECTOR ROUTING PROTOCOL IN MANET
Authors : T. Ramaprabha,M.Karthika
Paper Id :IJCRCST-JUNE16-07
Page No : 815 – 818
8.A LITERATURE SURVEY ON SECURITY BASED FORWARD RING SIGNATURE SCHEME USING IDENTITY INFORMATION
Authors : V.Dhinakari,R.NallaKumar,L.S.Santhoshkumar
Paper Id :IJCRCST-JUNE16-08
Page No : 819 – 823
9.SEARCH ENGINE BASED OBJECT SEARCH PATTERN APPLICATION USING CATEGORY CLASSIFICATION
Authors : M.Niveditha, K.Sivachandran
Paper Id :IJCRCST-JUNE16-09
Page No : 824 – 828
10.AN EFFICIENT DETECTION OF FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS THROUGH IN-NETWORK AGGREGATION SCHEME
Authors : M.Tharani,K.Sivachandran,T.Lakshmana kumar
Paper Id :IJCRCST-JUNE16-10
Page No : 829 – 833
11.FORWARDED SECURE IDENTITY BASED RING SIGNATURE SCHEME WITH SEGMENTED CELLULAR AUTOMATA SCHEMES
Authors : S.N.Saranya,P.Thilagavathi,M.Suguna
Paper Id :IJCRCST-JUNE16-11
Page No : 834 – 838
12.RETRIEVING THE SPATIAL DATA EFFICIENTLY USING SCORE BASED SPATIAL QUERY
Authors : M.Gomathy, G.Rajasekaran
Paper Id :IJCRCST-JUNE16-12
Page No : 839 – 841
13.AUTOMATIC DETECTION AND RECOVERY OF DATA CONFLICTS IN WEB SERVICE COMPOSITION FOR BANKING APPLICATION USING GRAPH PLANNING METHOD
Authors : S.Dhivya, Dr A.Ezil Sam Leni
Paper Id :IJCRCST-JUNE16-13
Page No : 842 – 845
14.ROUTING PROTOCOLS IN MOBILE AD HOC NETWORK
Authors : Dr T.Ramaprabha, V.Premalatha
Paper Id :IJCRCST-JUNE16-14
Page No : 846 – 850
15.THE METRICS SUITE FOR MAINTAINABILITY MODEL OF ASPECT ORIENTED SYSTEMS
Authors : Dr Ananthi Sheshasaayee, Roby Jose
Paper Id :IJCRCST-JUNE16-15
Page No : 851 – 853
16.A REVIEW OF WIRELESS SENSOR NETWORKS IN CLOUD COMPUTING
Authors : Dr.P.Sumitra,P.Kaladevi,K.Anitha
Paper Id :IJCRCST-JUNE16-16
Page No : 854 – 858
17.A REVIEW OF MANET PROTOCOLS AND APPLICATIONS
Authors : N.Boomathi,K.S.Saravanan,B.Nathiya,N.Kohila
Paper Id :IJCRCST-JUNE16-17
Page No : 859 – 862
18.AN ANALYTICAL COMPARISION OF VARIOUS ROUTING PROTOCOLS IN VANET
Authors : M.Karthika,N.Kowsalya
Paper Id :IJCRCST-JUNE16-18
Page No : 863 – 867