Revise Search
Issue | Title | |
Vol 4, No 6 (2016): October - November 2016 | PRIVILEGED INFORMATION MANIPULATION STRATEGY IN OPEN NETWORK | Abstract PDF |
G. Priyanka, S. Rajesh, Prof. Dr A. Kiranmayee | ||
Vol 2, No 3 (2014): April - May 2014 | STABILIZING SECURITY OF DISTRIBUTED DATA AMONG MULTIPLE USERS | Abstract PDF |
Dr.M.V. Siva Prasad, Ch. Suresh, I. Suryashekhar | ||
Vol 5, No 5 (2017): August - September 2017 | ANALYSIS IN CLOUD COMPUTING ACCESS CONTROL ISSUES | Abstract PDF |
V.Rajendra Medicharla, M.Janaki Ramudu | ||
Vol 4, No 5 (2016): August - September 2016 | PREVENTING DISCLOSURE OF SENSITIVE INFORMATION FROM UNAUTHORIZED NODES | Abstract PDF |
C. Mahesh, J.S. V.R.S.Sastry | ||
Vol 4, No 5 (2016): August - September 2016 | FUZZY-BASED CRYPTOSYSTEM FOR REVOLUTIONARY OPEN NETS | Abstract PDF |
Rendla Sagar, B. Ravi Kumar | ||
Vol 6, No 3 (2018): April - May 2018 | CLOUD SERVICES WITH SECURITY PRESERVATION AND ADMISSION CONTROL SCHEME | Abstract PDF |
E. Sulamithi, Pathri Dheeraja | ||
Vol 4, No 5 (2016): August - September 2016 | INTRODUCING A VARIETY OF ENCRYPTION POLICIES TO PROTECT DATA CONTENTS | Abstract PDF |
Ganam Swathi, Ch. Vijayakumari | ||
Vol 9, No 5 (2021): August - September 2021 | Attribute-Based Encryption Scheme for Secured data Storage in Cloud Computing | Abstract PDF |
V.S.VARA LAKSHMI, SARAKULA DEVANAM PRIYA | ||
Vol 5, No 3 (2017): April - May 2017 | A PERSONALIZED HIERARCHICAL QUALITY-BASED CIPHER TEXT CONTACT CONTROL PROCESS FOR MOBILE CLOUD COMPUTING | Abstract PDF |
Anusha R, P. Tara Kumari | ||
Vol 10, No 2 (2022): February - March 2022 | A Protected And Lightweight Data Distribution Program For Mobile Cloud Computing | Abstract PDF |
GUNDEBOINA NAGARAJU, G RAVI | ||
Vol 4, No 5 (2016): August - September 2016 | AN AUTHENTICATING STRATEGY BY USERS PATTERN | Abstract PDF |
Kandikonda Rajashekar, Dr. B. M.G.Prasad | ||
Vol 5, No 5 (2017): August - September 2017 | TRUTHFUL ACCESS CONTROL OF GRANULAR AGENTS FOR CLOUD-BASED SERVICES | Abstract PDF |
Suneetha Thaduri, S.Shobha Rani, P. Sangeeta | ||
Vol 5, No 3 (2017): April - May 2017 | MIXTURE CONVERSION WITH CONFIRMABLE ALLOCATION IN CLOUD USING CP-ABE SCHEM | Abstract PDF |
A.M. Rangaraj, L. Bhargav | ||
Vol 2, No 3 (2014): April - May 2014 | IMPROVING PRIVACY IN SHARING OF PERSONAL HEALTH DATA STORAGE ON CLOUD | Abstract PDF |
Vahidhunnisha J., Ramasamy ., Balasubramaniam T | ||
Vol 5, No 2 (2017): February - March 2017 | ENSURED DATA RECOVERY FOR LOCALIZED INTERRUPTION SYMPATHETIC MILITARY NETWORKS | Abstract PDF |
Mis.M.Jerusha Blessy, Prof.D.V. Rajesh Babu | ||
Vol 5, No 5 (2017): August - September 2017 | A RESTRICTED ACCEPTING-COMPLICITY DATA DISTRIBUTION METHOD FOR MULTIPLE SET IN THE CLOUD | Abstract PDF |
Mohd Abrar Uddin Shoeb, Mohd Arshad Hussain | ||
Vol 9, No 5 (2021): August - September 2021 | Security and Privacy Attribute Based Data Sharing in Public Cloud Storage | Abstract PDF |
MEDAPATI NAVALIKA, POTHULA SRI RAMAKRISHNA | ||
Vol 4, No 5 (2016): August - September 2016 | A SECURE MECHANISM FOR PROVIDING A HACK FREE MESH IN OPEN NETS | Abstract PDF |
N. Sainath, P. Padmanabham, Swapna Manthani | ||
Vol 5, No 1 (2017): December - January 2017 | OPEN VERIFICATION CLOUD DATA USING ABE SCHEME | Abstract PDF |
Sai Krishna Illendula, B.Kumar Swamy | ||
Vol 9, No 5 (2021): August - September 2021 | Multi - owner Secure Data Sharing in Cloud Computing Environment | Abstract PDF |
PATHIVADA ESTHERU RANI, POTHULA SRI RAMAKRISHNA | ||
Vol 5, No 4 (2017): June - July 2017 | PROFICIENT LICENSE LESS ENTRANCE ORGANIZE FOR WIRELESS BODY AREA NETWORKS | Abstract PDF |
A. Sravani, Dr. R.China Appala Naidu | ||
Vol 4, No 6 (2016): October - November 2016 | A LITERATURE STUDY ON TRAFFIC, TRAFFIC CONTROL DEVICES, ROUNDABOUTS, PEDESTRIAN ACCESS | Abstract PDF |
Tanay Bysani | ||
Vol 5, No 4 (2017): June - July 2017 | ASSOCIATING COMMUNAL TELEVISION: A MICRO BLOGGING RECOMMENDER SYSTEM | Abstract PDF |
Samudraveni Chennamsetty, S.V. Ramanaiah | ||
Vol 4, No 6 (2016): October - November 2016 | AN ENCRYPTION SCHEME WITH SUPPORTABLE ALLOCATION IN CLOUD COMPUTING | Abstract PDF |
Mamidi Swetha, Y.Jeevan Nagendra Kumar | ||
Vol 6, No 3 (2018): April - May 2018 | DELICATE ARRANGEMENT FOR BINARY-DYNAMIC ACCESS CONTROL FOR WEB-BASED CLOUD COMPUTING SERVICES | Abstract PDF |
R. Shabari, G. Anitha | ||
Vol 5, No 3 (2017): April - May 2017 | ACCOUNT ACTIVE TRUST DEPICTION FOR USER APPROVAL | Abstract PDF |
K. Sadhana, S.Sree Hari Raju | ||
Vol 6, No 3 (2018): April - May 2018 | A RELIABLE DATA OUTSOURCING WITH REVOCABLE REPOSITORY IDENTITY-BASED CONVERSION IN CLOUD COMPUTING | Abstract PDF |
Lochar Sowmya, Thalla Shankar | ||
Vol 2, No 5 (2014): August - September 2014 | A SECURE KEY OPTIMIZING FOR EFFICIENT AND BROAD CAST TO REMOTE GROUPS | Abstract |
V.Veera Prasad, D.Laxmi Prasanna | ||
Vol 4, No 6 (2016): October - November 2016 | DESIRABLE SOLUTION TO UPDATE THE ENCRYPTED DATA IN OPEN NETS | Abstract PDF |
Chevuru Kavitha, B Bhaskar | ||
Vol 6, No 3 (2018): April - May 2018 | SUPER OBTAINED TWO FACTORS GET THE CHANCE TO CONTROL FOR WEB APPLICATIONS | Abstract PDF |
Ediga Deepthi, D. Venkateshwarlu | ||
Vol 2, No 5 (2014): August - September 2014 | EXPLORING AND UNDERSTAND USER SEARCH INTENTIONS IN WEB SEARCH ENGINE | Abstract |
P.S.D.D.R. Saraja, M.Srinivasa Aruna | ||
Vol 5, No 3 (2017): April - May 2017 | AN CAPABLE DOCUMENTATION LESS ENTRÉE MANAGE FOR WBANS | Abstract PDF |
T. Vanitha, A. Chethana | ||
Vol 6, No 3 (2018): April - May 2018 | DUAL ACCESS CONTROL OF THE EXACT COMPONENTS OF CLOUD COMPUTING WEB SERVICES | Abstract PDF |
G Sainadh, K Vijay Kumar | ||
Vol 5, No 3 (2017): April - May 2017 | A PROTECTED OPPOSING-AGREEMENT INFORMATION DISTRIBUTION DESIGN FOR ACTIVE GROUPS IN THE CLOUD | Abstract PDF |
SP. Pushpa Raj Kumar, B. Ananda Kumar, D.Madhu Babu | ||
Vol 2, No 4 (2014): June - July 2014 | A KEY BASED DATA SHARING PROTOCOL FOR SECURE INTER GROUP TRANSFERS | Abstract PDF |
K. Balaji, K Nukaraju | ||
Vol 5, No 3 (2017): April - May 2017 | REFINED DUAL ASPECT ENTRÉE MANAGEMENT FOR CLOUD SERVICES | Abstract PDF |
A.Chanikya Chakravarthi, R.Raj Kumar | ||
0 - 0 of 36 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.