Revise Search
Issue | Title | |
Vol 5, No 6 (2017): October - November 2017 | A DUPLICATE ACTIVE STORAGE INDEXES FOR MULTIPLE CLIENT ENVIRONMENTS | Abstract PDF |
Sumiyah Khaja, Mohammed Abdul Bari | ||
Vol 5, No 4 (2017): June - July 2017 | AVOIDING REPLICA ACTIVE DATA STORAGE FOR MULTIPLE USER SITUATION | Abstract PDF |
M. Githanjali, A.V.H Sai Prasad | ||
Vol 5, No 4 (2017): June - July 2017 | UNIQUE PROGRESSIVE TESTAMENT OF CACHE FOR MULTI-USER IN CLOUD ENVIRONMENTS | Abstract PDF |
S. Spandana Reddy, P. Nethrasri | ||
Vol 5, No 4 (2017): June - July 2017 | UNESSENTIAL ENERGETIC PROOF OF ACHIEVEMENT FOR MULTIPLE-CONSUMER ENVIRONMENTS | Abstract PDF |
S.Aruna Rani, Dr. R.China Appala Naidu | ||
Vol 5, No 5 (2017): August - September 2017 | DYNAMIC POST ABLE FOR MULTI-USER ENVIRONMENTS | Abstract PDF |
P. Madhavi, Dr. B. Vijayakumar | ||
Vol 6, No 3 (2018): April - May 2018 | DEDUPLICABLE DYNAMIC STORAGE GUIDE FOR MULTIPLE USER ENVIRONMENTS | Abstract PDF |
P Bhavani, P Niranjan | ||
Vol 5, No 2 (2017): February - March 2017 | HYBRID CLOUD METHODOLOGY FOR SAFE APPROVED DEDUPLICATIONS | Abstract PDF |
Thirumanikuppam Govindarajan Bhanurekha, Challa Bhaskar Rao | ||
Vol 2, No 1 (2014): December - January 2014 | SECURE DATA DISTRIBUTION FOR EFFECTIVE GROUPS IN CLOUD | Abstract PDF |
Namburi Govardhana Rao, Vadavalli Adilakshmi Kameswari | ||
Vol 5, No 4 (2017): June - July 2017 | RESTRICTIVE CHARACTER-BASED ADVERTISE INTERMEDIARY RECONSTRUCTION AND ITS PETITION TO DISTORT EMAIL | Abstract PDF |
B. Jyothi, K. Vinay Kumar | ||
Vol 4, No 6 (2016): October - November 2016 | A CROSS CLOUD METHOD FOR PROTECTED APPROVED DEDUPLICATION | Abstract PDF |
Murali . J, V Krishna Chaitanya | ||
Vol 4, No 5 (2016): August - September 2016 | A HIGH-SECURE COMPRESSION UTILITY FOR CROSS ARCHITECTURE DATA STORE | Abstract PDF |
Thipparapu Vijetha, M. Naresh Choudary | ||
Vol 9, No 5 (2021): August - September 2021 | Encrypted Data Sharing in Cloud data storage using Cloud Computing | Abstract PDF |
JAMPANA POOJA SRI MANI, SATTI VIJAYA KRISHHNA REDDY | ||
Vol 3, No 5 (2015): August - September 2015 | EMPLOYING OF INNOVATIVE APPROACH FOR MANAGING OF DATA ON CLOUD SERVER | Abstract PDF |
Naveen Yerramshetti | ||
Vol 4, No 6 (2016): October - November 2016 | A MIX CLOUD TO ELIMINATE REPLICA DATA CERTIFIED SAFE APPROACH | Abstract PDF |
Pericharla Mukhesh Varma, Gonaboyena Subramanyam | ||
Vol 2, No 4 (2014): June - July 2014 | SECURE DATA DISTRIBUTION FOR VIBRANT GROUPS IN THE CLOUD | Abstract PDF |
Ch. Naveen, G.Charles Babu | ||
Vol 4, No 4 (2016): June - July 2016 | TOWARDS A NOVEL HYBRID APPROACH FOR REMOVING DUPLICATE COPIES OF REPEATED DATA | Abstract PDF |
D. Sravani, P. Giridhar | ||
Vol 5, No 2 (2017): February - March 2017 | SECURE ENDORSED AVOIDING REPETITION IN PUBLIC AND PRIVATE APPROACH | Abstract PDF |
T. Monica, M.Bhanu Prakash, J. Deepthi | ||
Vol 4, No 4 (2016): June - July 2016 | A RELIABLE MANAGEMENT SYSTEM FOR CLOUD AND SENSOR NETWORKS | Abstract PDF |
Md. Nusrath, G. Lakpathi | ||
Vol 2, No 3 (2014): April - May 2014 | EFFICIENT DATA STORAGE IN CLOUD | Abstract PDF |
Ankush Sharma, Vinayak U C | ||
Vol 5, No 5 (2017): August - September 2017 | ENABLE CLOUD ACCUMULATE APPRAISAL WITH PROVABLE FOR OUT SOURCE OF EXPLANATION UPDATES | Abstract PDF |
Suneetha Thaduri, Katta Padmaja | ||
Vol 4, No 5 (2016): August - September 2016 | A LITERATURE SURVEY ON A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERFACES | Abstract PDF |
K. Spandana, T. Neetha | ||
Vol 4, No 3 (2016): April - May 2016 | IMPLEMENTATION OF AN EFFECTIVE APPROACH FOR DATA PRIVACY WITH IN CLOUD SYSTEM | Abstract PDF |
T. Neetha | ||
Vol 5, No 6 (2017): October - November 2017 | SEMANTIC REAL EXPLORATION THROUGH FAIRLY ACCURATE METHODOLOGY FOR HUGE STORAGE SYSTEMS | Abstract PDF |
Chunduri Madhu Babu, Dr. B. Vijayakumar | ||
Vol 9, No 5 (2021): August - September 2021 | Competent Encryption Framework Based Secure Access Mechanism for Cloud Data Services | Abstract PDF |
TATINI REETHIKA, SARAKULA DEVANAM PRIYA | ||
Vol 5, No 1 (2017): December - January 2017 | OPEN VERIFICATION CLOUD DATA USING ABE SCHEME | Abstract PDF |
Sai Krishna Illendula, B.Kumar Swamy | ||
Vol 4, No 4 (2016): June - July 2016 | FLEXIBLE DATA SHARING IN STORAGE SYSTEMS OF CLOUD COMPUTING | Abstract PDF |
Bandaru Ravi Teja, K.Ashok Kumar | ||
Vol 1, No 3 (2013): APRIL - MAY | DATA VALIDATION AND RELIABILITY PROOF IN CLOUD STORAGE | Abstract PDF |
P. Srinivas, Dr.R. V. Krishnaiah | ||
Vol 5, No 1 (2017): December - January 2017 | CONFIDENTIALITY-MAINTAINING PUBLIC ASSESSING FOR RESTORING-CODE-BASED CLOUD STORAGE | Abstract PDF |
P. Chandu, P. Prashanth Kumar | ||
Vol 4, No 5 (2016): August - September 2016 | A CUMULATIVE KEY FOR FLEXIBLE ADOPTIONS OF CODE TEXT GROUP | Abstract PDF |
Nagababu Morampudi, A. Sreenivas Rao | ||
Vol 5, No 4 (2017): June - July 2017 | PUBLIC-KEY ENCRYPTION WITH KEY PURSUE SURE DISTRACT STORAGE IN DOUBLE SERVER | Abstract PDF |
Guntamukkala P Kumar, P. Balakeshava Reddy | ||
Vol 5, No 5 (2017): August - September 2017 | SUPPORTING CLOUD ASSESSMENT WITH KEY UPDATES CHECKED | Abstract PDF |
Pendyala Ashwini, D.Aruna Kumari | ||
Vol 5, No 3 (2017): April - May 2017 | A PROTECTED OPPOSING-AGREEMENT INFORMATION DISTRIBUTION DESIGN FOR ACTIVE GROUPS IN THE CLOUD | Abstract PDF |
SP. Pushpa Raj Kumar, B. Ananda Kumar, D.Madhu Babu | ||
Vol 9, No 5 (2021): August - September 2021 | Security and Privacy Attribute Based Data Sharing in Public Cloud Storage | Abstract PDF |
MEDAPATI NAVALIKA, POTHULA SRI RAMAKRISHNA | ||
Vol 4, No 5 (2016): August - September 2016 | DISCRETION PROTECTIVE OPEN CHECKING FOR REDEVELOPING CIPHER CREATED HAZE | Abstract PDF |
N. Sainath, Bandi Mamatha | ||
Vol 4, No 4 (2016): June - July 2016 | WIRELESS DETECTION AND DEVELOPMENT OF CLOUD BASED LIGHT INTENSITY MONITORING SYSTEM USING RASPBERRY PI | Abstract PDF |
Syed Fasi Uddin, Sudha Arvind | ||
Vol 5, No 5 (2017): August - September 2017 | A RESTRICTED ACCEPTING-COMPLICITY DATA DISTRIBUTION METHOD FOR MULTIPLE SET IN THE CLOUD | Abstract PDF |
Mohd Abrar Uddin Shoeb, Mohd Arshad Hussain | ||
Vol 4, No 5 (2016): August - September 2016 | AN INNOVATIVE PERIODIC RELIABILITY AUTHENTICATION SYSTEM WITHOUT THE LOCAL REPLICA | Abstract PDF |
T. Anitha, G. Spandana | ||
Vol 4, No 6 (2016): October - November 2016 | A WELL-ORGANIZED PREVENTIVE SCHEME FOR KGA USING HASH CODES | Abstract PDF |
Suneetha Thaduri, Hyma Birudaraju | ||
Vol 6, No 3 (2018): April - May 2018 | A NOVEL AND CAPABLE SCHEME ASSURANCE DATA PRIVACY OF ENCRYPTION CATEGORY | Abstract PDF |
B. Kavitha, Dr. Y.Ravi Kumar | ||
Vol 4, No 4 (2016): June - July 2016 | AN UNIDENTIFIED CRYPTOGRAPHY FOR ON-DEMAND REMOTE DATA IN CLOUD | Abstract PDF |
Shaik Salma, S.Suresh Babu | ||
Vol 4, No 5 (2016): August - September 2016 | A SECURE MECHANISM FOR PROVIDING A HACK FREE MESH IN OPEN NETS | Abstract PDF |
N. Sainath, P. Padmanabham, Swapna Manthani | ||
0 - 0 of 41 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.