1.ENABLING PRIVACY-PRESERVING FOR MOBILE USERS GENERATING LOCATION PROOFS
Authors : L.Soundharya,Dr.S.Kumaravel
Paper Id :IJCRCST-OCTOBER17-01
Page No : 1-5
2.PROBABILISTIC APPROACH FOR DETECTING NODE FAILURES IN MOBILE WIRELESS NETWORKS
Authors : N.Thamaraiselvan, M.Namasivayam
Paper Id :IJCRCST-OCTOBER17-02
Page No : 6-8
3.WEB INFORMATION SECURITY WITH CLIENT AND CLOUD SERVER USING IOT TECHNIQUES
Authors : R.Vetriselvan, Dr. P.Srivaramangai
Paper Id :IJCRCST-OCTOBER17-03
Page No : 9-12
4.A COMPREHENSIVE STUDY OF BUSINESS PROCESS MANAGEMENT IN THE CLOUD
Authors : Aagna Nileshbhai Katrodia,Dr. Deepak G,Dr. S. Venkatesan
Paper Id :IJCRCST-OCTOBER17-04
Page No : 13-19
5.DETECTION OF MALICIOUS PACKET DROPPERS IN MOBILE AD HOC NETWORK
Authors : S.Sakthivel,P.Gayathiri Devi
Paper Id :IJCRCST-OCTOBER17-05
Page No : 20- 24
6.EFFICIENT QUALITY OF SERVICE ROUTING FOR MOBILE AD HOC NETWORK
Authors : R.Dheenadhyalan,S.Saravanan
Paper Id :IJCRCST-OCTOBER17-06
Page No : 25-29