Published: 2016-01-01

DOI: https://doi.org/10.65521/mjret.v3i1.1254

IDENTIFICATION AND PREVENTION OF FAKE IDENTITIES IN SOCIAL MEDIA

Shadaf J Warunkar, Nitin A Khandare, Jaihind D Mungle, Vishal V Shinde, Prof. Rohit Wagdarikar

865 - 871

DOI: https://doi.org/10.65521/mjret.v3i1.1255

A SECURE INTRUSION DETECTION SYSTEM FOR MANETS USING EAACK

Ganesh Bhanudas Munde, Prof. Sunil Damodar Rathod

877 - 886

DOI: https://doi.org/10.65521/mjret.v3i1.1256

SCALABLE DATA SHARING BY USING KEY AGGREGATION

Mukesh Giri, Shivanand Gaikwad, Akshay Jadhav, Rupesh Kandhare, Prof.Nitin Hambir

872 - 876

DOI: https://doi.org/10.65521/mjret.v3i1.1257

SECURED AND EFFICIENT PIN ENTRY METHOD USING ECC

Mr. Sandeep Patil, Mr. Anup Shinde, Mr. Nilesh shinde, Mr. Shreyas Peadmkar, Prof. Laxmi Madhuri

948 - 952

DOI: https://doi.org/10.65521/mjret.v3i1.1258

REVIEW ON SMART HOME CONTROL AND MONITOR SYSTEM

Abhijeet Rajurkar, Onkar Shinde, Vinayak Shinde, Bhushan Waghmode, Prof. Yogesh Thorat

887 - 891

DOI: https://doi.org/10.65521/mjret.v3i1.1259

APPLICATION OF IOT-WSN IN HOME AUTOMATION SYSTEM: A LITERATURE SURVEY

Prof S A Jain, Stevan Maineka, Pranali Nimgade

916 - 922

DOI: https://doi.org/10.65521/mjret.v3i1.1260

NEIGHBOUR-AWARE ROUTING PROTOCOL IN MANET TO MINIMIZE ROUTING OVERHEAD

Akshay Shah, Danish Nizami, Isha Chopra, Navneet Bhagasra

892 - 902

DOI: https://doi.org/10.65521/mjret.v3i1.1261

SPOOFER LOCATION DETECTION USING PASSIVE IP TRACEBACK

Virandra Patil, Pritish Deshpande, Mahesh Talekar, Swapnil Tapkir, Dhanajay khade, Prof.Nitin Hambir

903 - 910

DOI: https://doi.org/10.65521/mjret.v3i1.1262

EFFECT OF FIBRE LENGTH AND PERCENTAGE OF SISAL ON STRENGTH OF CONCRETE

Mr. Jitendra D. Dalvi, Dr. Uttam B. Kalwane, Mrs. Pallavi Pasnur

923 - 932

DOI: https://doi.org/10.65521/mjret.v3i1.1264
DOI: https://doi.org/10.65521/mjret.v3i1.1265
DOI: https://doi.org/10.65521/mjret.v3i1.1266