Revise Search
Issue | Title | |
Vol 1, No 4 (2013): JUNE - JULY | A NEW CO-OPERATIVE KEY GENERATION TECHNIQUE FOR SYMMETRIC ENCRYPTION | Abstract PDF |
DR.V. Nanda Kumar | ||
Vol 5, No 5 (2017): August - September 2017 | ANALYSIS IN CLOUD COMPUTING ACCESS CONTROL ISSUES | Abstract PDF |
V.Rajendra Medicharla, M.Janaki Ramudu | ||
Vol 6, No 3 (2018): April - May 2018 | UNDETERMINED CIPHER LANGUAGE PROGRAMMING AND IMPLEMENTATION OF ITS APPLICATION | Abstract PDF |
Chintala Jyothsna, D. Venkateshwarlu | ||
Vol 5, No 1 (2017): December - January 2017 | OPEN VERIFICATION CLOUD DATA USING ABE SCHEME | Abstract PDF |
Sai Krishna Illendula, B.Kumar Swamy | ||
Vol 3, No 1 (2015): December - January 2015 | DESIGN OF SAFER + ENCRYPTION ALGORITHM FOR BLUETOOTH TRANSMISSION | Abstract PDF |
Jagadeesh Babu B, D. Kishore, R.V.Vijay Krishna | ||
Vol 9, No 6 (2021): October - November 2021 | Secure Access control Technology towards Data Sharing and Storage in Cloud Computing | Abstract PDF |
PICHIKA MOOLESWARA RAO, V G L NARASAMBA | ||
Vol 4, No 6 (2016): October - November 2016 | IMPORTANT-COMBINED ENCODING FOR ASCENDABLE DATA SHARING IN CLOUD STORAGE | Abstract PDF |
Vempuluri Venkateswarlu, N Venkatadri | ||
Vol 5, No 5 (2017): August - September 2017 | FLEXIBLE DATA STORAGE, RUGGEDLY BEDECKED AND BRILLIANT IN CLOUD COMPUTING | Abstract PDF |
B. Madhava Sai Reddy, Y. Praveen Kumar | ||
Vol 9, No 5 (2021): August - September 2021 | Competent Encryption Framework Based Secure Access Mechanism for Cloud Data Services | Abstract PDF |
TATINI REETHIKA, SARAKULA DEVANAM PRIYA | ||
Vol 9, No 1 (2021): December - January 2021 | Identity And Influence Control For Cipher Schema For Defining Strings | Abstract PDF |
REDDY APPALASWAMY, B.S.S MONICA, GOPISETTI GURUKESAVA DASU | ||
Vol 4, No 5 (2016): August - September 2016 | A SECURE MECHANISM FOR PROVIDING A HACK FREE MESH IN OPEN NETS | Abstract PDF |
N. Sainath, P. Padmanabham, Swapna Manthani | ||
Vol 5, No 4 (2017): June - July 2017 | RESTRICTIVE CHARACTER-BASED ADVERTISE INTERMEDIARY RECONSTRUCTION AND ITS PETITION TO DISTORT EMAIL | Abstract PDF |
B. Jyothi, K. Vinay Kumar | ||
Vol 5, No 2 (2017): February - March 2017 | MEASURED SECURITY FEATURES IMPLEMENTATION IN CLOUD ENVIRONMENT | Abstract PDF |
Chandhini K | ||
Vol 4, No 5 (2016): August - September 2016 | PRIVACY AUDITING AND DEDUPLICATING DATA WITH SECCLOUD IN CLOUD COMPUTING | Abstract PDF |
K. Ravi Prakash, T. Ravindar Reddy | ||
Vol 5, No 4 (2017): June - July 2017 | DISTINCTIVENESS-BASED KEY-LEGITIMATE AND KEY EXCHANGE PROTOCOLS | Abstract PDF |
D. Srija, Dr. R.China Appala Naidu | ||
Vol 4, No 1 (2016): December - January 2016 | A LITERATURE STUDY ON PARALLEL KEY CRYPTOGRAPHIC ALGORITHM | Abstract PDF |
Amalna Jose | ||
Vol 5, No 1 (2017): December - January 2017 | COMMUNICATIVE AND PROFICIENT DATA ENTRÉE MANAGE FOR MULTI RIGHTS CLOUD | Abstract PDF |
A.Divya Bharathi, Syed. Mazharuddin | ||
Vol 6, No 3 (2018): April - May 2018 | A NOVEL AND CAPABLE SCHEME ASSURANCE DATA PRIVACY OF ENCRYPTION CATEGORY | Abstract PDF |
B. Kavitha, Dr. Y.Ravi Kumar | ||
Vol 4, No 5 (2016): August - September 2016 | AVOIDING INTERMITTENT NET CONNECTIVITY ON BATTLE REGIONS | Abstract PDF |
Arjun ., M. Naresh Choudary | ||
Vol 5, No 4 (2017): June - July 2017 | A PROFICIENT FILE LADDER ABE TECHNIQUE IN CLOUD SERVER | Abstract PDF |
P. Vasanthi, J.Madhan Kumar | ||
Vol 3, No 6 (2015): October - November 2015 | IMPLEMENTATION OF A SCALABLE APPROACH OF IMAGE TRANSMISSION | Abstract PDF |
Priyanka Mettu, P.G.K Sirisha | ||
Vol 5, No 6 (2017): October - November 2017 | SEARCH FOR SYNCHRONIZED KEYWORDS USING THE SELECTED LAB FEATURE AND ENABLE RE CRYPTO SYSTEM FOR ELECTRONIC HEALTH CLOUDS | Abstract PDF |
Sattenapalli Hari Babu, B. Nagaraju Naik | ||
Vol 4, No 5 (2016): August - September 2016 | A CUMULATIVE KEY FOR FLEXIBLE ADOPTIONS OF CODE TEXT GROUP | Abstract PDF |
Nagababu Morampudi, A. Sreenivas Rao | ||
Vol 5, No 4 (2017): June - July 2017 | PRIVACY DISPERSED DATA FINDING WITH BROADCASTING IN WSNS | Abstract PDF |
Bunga Rajesh, Sahu Smita Rani | ||
Vol 3, No 5 (2015): August - September 2015 | PROVISION OF AN IMPROVISED SYSTEM FOR MANAGING PRIVACY OF LOCATIONS | Abstract PDF |
Naveen Yerramshetti | ||
Vol 11, No 3 (2023): April - May 2023 | An Intricate Network Sharing Protocol For Open Networks With Several Hierarchies | Abstract PDF |
SANDEEP AGARWALLA, PRIYANKA ROY, Dr. B.VENU KUMAR | ||
Vol 4, No 6 (2016): October - November 2016 | A WELL-ORGANIZED PREVENTIVE SCHEME FOR KGA USING HASH CODES | Abstract PDF |
Suneetha Thaduri, Hyma Birudaraju | ||
Vol 5, No 5 (2017): August - September 2017 | COMBINATION KEYWORD QUERIES WITH SELECTED TESTER AND TIMING FACILITATE IN ALTERNATIVE RECRYPTOGRAPY FUNCTION | Abstract PDF |
Santhapuram Srilatha, B. Nageswara Rao | ||
Vol 4, No 5 (2016): August - September 2016 | COMPUTING PRECISION SIGNIFICANCE SCORE BETWEEN ENCRYPTED INDEX AND QUERY PATHS | Abstract PDF |
D. Umamaheswari, A. Sreenivas Rao | ||
Vol 5, No 3 (2017): April - May 2017 | A PRIVACY AND DYNAMIC MULTI-KEYWORDS RANKED SEARCH SCHEME OVER CLOUD DATA ENCRYPTED | Abstract PDF |
G. Kavitha, K Surendra Reddy | ||
Vol 3, No 3 (2015): April - May 2015 | OVERVIEW TOWARDS STABILIZING OF DATA STORAGE IN CLOUD SYSTEM | Abstract PDF |
S. Narendar, U. Sivaji | ||
Vol 10, No 2 (2022): February - March 2022 | A Protected And Lightweight Data Distribution Program For Mobile Cloud Computing | Abstract PDF |
GUNDEBOINA NAGARAJU, G RAVI | ||
Vol 4, No 6 (2016): October - November 2016 | AN ENCRYPTION SCHEME WITH SUPPORTABLE ALLOCATION IN CLOUD COMPUTING | Abstract PDF |
Mamidi Swetha, Y.Jeevan Nagendra Kumar | ||
Vol 5, No 5 (2017): August - September 2017 | COMBINATION KEYWORD SEARCH WITH SELECTED TESTER AND TIMING FACILITATE ALTERNATIVE RE ENCRYPTION PURPOSE FOR HEALTH CLOUDS | Abstract PDF |
Bathoju Ashwini, Dr. Ravi Mathey | ||
Vol 4, No 5 (2016): August - September 2016 | ELEVATING THE PROBLEMS OF LINEAR SEARCHABLE CIPHERTEXT ON LARGE-SCALE DATABASE | Abstract PDF |
Mukta Varsha, K. Ramana Reddy | ||
Vol 5, No 3 (2017): April - May 2017 | DUAL SERVER PASSWORD VALIDATION KEYWORD SWAPPING RULES | Abstract PDF |
Bakka Shalini, K. Chandrakala | ||
Vol 4, No 4 (2016): June - July 2016 | FRAGMENT-VISIBLE MOSAIC IMAGES BY COLOR TRANSFORMATIONS | Abstract PDF |
S. Mahesh, Duda Prasad | ||
Vol 5, No 3 (2017): April - May 2017 | INTEGRATED KEY SEARCH WITH SELECTED SUPPORTER AND TEMPORAL ARRANGEMENT ACTIVATED CONCEAL RE-FORMATION UTILITY FOR ON-LINE HEALTH RECORDS | Abstract PDF |
Naveen Kumar M A, T. Geetha Lakshmi | ||
Vol 2, No 6 (2014): October - November 2014 | A NOVEL APPROACH TO POLICY BASED SIMILARITY IN SUBSCRIPTION IMPLICATION TO INITIATOR FOR MOBILE SOCIAL NETWORKS (MSNS) | Abstract |
B. Subrahamanyam, M.V. Satyanarayana | ||
Vol 4, No 5 (2016): August - September 2016 | ANONYMOUS THUMB IMPRESSION TECHNOLOGY FOR LEGAL DISTRIBUTION OF HYPER DATA | Abstract PDF |
Bisapongu Spandana, T. Shesagiri | ||
Vol 5, No 5 (2017): August - September 2017 | SEARCH FOR HARMONIZED KEYWORDS USING THE VOTED LAB FEATURE AND ALLOW RE CRYPTOSYSTEM FOR ELECTRONIC HEALTH CLOUDS | Abstract PDF |
M. Arvindhan, B.Bharathi Kannan, G S Pradeep Ghantasala | ||
Vol 4, No 4 (2016): June - July 2016 | DYNAMIC MULTI-KEYWORD RANKING SCHEME ON ENCRYPTED CLOUD DATA | Abstract PDF |
K. Narendra, G K V Narasimhareddy | ||
Vol 5, No 3 (2017): April - May 2017 | A NON-ISOLATION ARRANGEMENT OF DATA FOR DIGGING | Abstract PDF |
G.D. Marykeerthana, K. Narsimhulu | ||
Vol 2, No 5 (2014): August - September 2014 | EXPOSURE TOWARDS DATA COLORING IN RESPONSIBLE COMPUTING | Abstract PDF |
Renuka Devi Malige, Ch. Kiran | ||
Vol 9, No 5 (2021): August - September 2021 | Decentralizing Multi-Authority Attribute-based Data Sharing Scheme in Cloud computing | Abstract PDF |
JEEDIGUNTA SAI DIVYA, V.G.L NARASAMBA | ||
Vol 4, No 5 (2016): August - September 2016 | CONSENTING ALL LOCATION-QUERIES TO BE ASSESSED APPROPRIATELY BY THE SERVER | Abstract PDF |
G. Shravanya, Ch. China Subba Reddy, T. Shesagiri | ||
Vol 4, No 4 (2016): June - July 2016 | FLEXIBLE DATA SHARING IN STORAGE SYSTEMS OF CLOUD COMPUTING | Abstract PDF |
Bandaru Ravi Teja, K.Ashok Kumar | ||
Vol 5, No 3 (2017): April - May 2017 | MIXTURE CONVERSION WITH CONFIRMABLE ALLOCATION IN CLOUD USING CP-ABE SCHEM | Abstract PDF |
A.M. Rangaraj, L. Bhargav | ||
Vol 2, No 2 (2014): February - March 2014 | ROBUST AND RESOURCEFUL SINGLE SIGN-ON SCHEME FOR SECURE ENCRYPTION OF USER CREDENTIAL | Abstract PDF |
E.Venkata Ramana, Dr. D. Vasumathi | ||
Vol 4, No 5 (2016): August - September 2016 | PROTECTED FACTS RECOVERY USED FOR DECENTRALIZED INTERFERENCE CHARITABLE SERVICES NETWORKS | Abstract PDF |
Pavani Gottimukkala, E. Raveendra Reddy | ||
Vol 5, No 5 (2017): August - September 2017 | FILE SERIES EFFECTIVELY SEQUENCING CHARACTER-BASED ENCRYPTION IN CLOUD COMPUTING | Abstract PDF |
Sana Ali, Mohd Arshad Hussain | ||
Vol 4, No 4 (2016): June - July 2016 | A NOVEL STUDY FOR MANAGING PRIVACY OF DATA AND USER IN ACCESS CONTROL METHODS | Abstract PDF |
M. Subhashini, N. Sujatha | ||
Vol 5, No 2 (2017): February - March 2017 | A SECURE AND DYNAMIC MULTI-WATCHPHRASE RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA | Abstract PDF |
A.M. Rangaraj, S. Palani, P Yasmin Bhanu | ||
Vol 2, No 1 (2014): December - January 2014 | SHIELDING OF HEALTH RECORDS CONFIDENTIALITY IN CLOUD COMPUTING | Abstract PDF |
Swathi Lakshmi Rangudu, Ch.Subba Reddy, T. Shesagiri | ||
Vol 6, No 3 (2018): April - May 2018 | FIND KEY TO EFFICIENT AND EXPRESSIVE WAY AROUND DATA ENCRYPTION IN THE CLOUD | Abstract PDF |
D. Dhanalakshmi, Y.Rajesh Babu | ||
Vol 4, No 4 (2016): June - July 2016 | BUILDING OF A KEY MANAGEMENT APPROACH OF EFFICIENT COMMUNICATIONS IN WIRELESS SYSTEMS | Abstract PDF |
K. Hymavathi, K.Ashok Kumar | ||
Vol 5, No 2 (2017): February - March 2017 | ENSURED DATA RECOVERY FOR LOCALIZED INTERRUPTION SYMPATHETIC MILITARY NETWORKS | Abstract PDF |
Mis.M.Jerusha Blessy, Prof.D.V. Rajesh Babu | ||
Vol 6, No 3 (2018): April - May 2018 | COMPATIBILITY WITH THE PROXY AGENT HAS BEEN TESTED THROUGH TRIAL AND TIME THAT WAS CHOSEN FOR EMAIL MESSAGES | Abstract PDF |
B. Anusha, J. Vidya | ||
Vol 4, No 5 (2016): August - September 2016 | A LITERATURE SURVEY ON A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERFACES | Abstract PDF |
K. Spandana, T. Neetha | ||
Vol 5, No 4 (2017): June - July 2017 | PUBLIC-KEY ENCRYPTION WITH KEY PURSUE SURE DISTRACT STORAGE IN DOUBLE SERVER | Abstract PDF |
Guntamukkala P Kumar, P. Balakeshava Reddy | ||
Vol 4, No 2 (2016): February - March 2016 | AN EFFECTIVE APPROACH FOR HIDING ENCRYPTED MESSAGES WITH NEURAL KEY USING LSB IMAGE STEGANOGRAPHY | Abstract PDF |
C.Immaculate Mary, P. Roshni Mol | ||
0 - 0 of 61 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.