1.A REVIEW ON ACHIEVING SECURITY BY FRAGMENTATION AND REPLICATION OF DATA IN LARGE-SCALE DISTRIBUTED FILE SYSTEMS
Authors : G.Sudhakar,C.Muruganandam
Paper Id :IJCRCST-AUGUST17-01
Page No : 1-3
2.GENERATED OTP VALUE IS ENCRYPTED USING BLOWFISH ALGORITHM IN CLOUD SECURITY
Authors : S.Meena,Dr.N.Kowsalya
Paper Id :IJCRCST-AUGUST17-02
Page No : 4-7
3.AN EFFICIENT METHOD FOR AUTHENTICATING IP ADDRESS USING ITS (IMPLICIT TOKEN SCHEME)
Authors : K.Gayathri,T.Karunakaran
Paper Id :IJCRCST-AUGUST17-03
Page No : 8-10
4.AUTHENTICATION FRAMEWORK WITH DELAY-TOLERANT DATA TRAFFIC TO VANET
Authors : M.Meena,T.Karunakaran
Paper Id :IJCRCST-AUGUST17-04
Page No : 10-14
5.SECURE TRANSMISSION BASED UPON THE SECRECY FOR LARGE MULTIUSER MIMO SYSTEMS: A SURVEY
Authors : E.Vimala,M.Lalli
Paper Id :IJCRCST-AUGUST17-05
Page No : 15-17
6.COGNITIVE BIG DATA: SURVEY AND REVIEW ON BIG DATA ANALYTICS FOR ONLINE SOCIAL MEDIA
Authors : S. Gandhimathi,Dr. V. Baby Deepa
Paper Id :IJCRCST-AUGUST17-06
Page No : 18-27