Search Results


Revise Search
 
Issue Title
 
Vol 1, No 4 (2013): JUNE - JULY A NEW CO-OPERATIVE KEY GENERATION TECHNIQUE FOR SYMMETRIC ENCRYPTION Abstract PDF
DR.V. Nanda Kumar
 
Vol 5, No 5 (2017): August - September 2017 ANALYSIS IN CLOUD COMPUTING ACCESS CONTROL ISSUES Abstract PDF
V.Rajendra Medicharla, M.Janaki Ramudu
 
Vol 6, No 3 (2018): April - May 2018 UNDETERMINED CIPHER LANGUAGE PROGRAMMING AND IMPLEMENTATION OF ITS APPLICATION Abstract PDF
Chintala Jyothsna, D. Venkateshwarlu
 
Vol 5, No 1 (2017): December - January 2017 OPEN VERIFICATION CLOUD DATA USING ABE SCHEME Abstract PDF
Sai Krishna Illendula, B.Kumar Swamy
 
Vol 3, No 1 (2015): December - January 2015 DESIGN OF SAFER + ENCRYPTION ALGORITHM FOR BLUETOOTH TRANSMISSION Abstract PDF
Jagadeesh Babu B, D. Kishore, R.V.Vijay Krishna
 
Vol 9, No 6 (2021): October - November 2021 Secure Access control Technology towards Data Sharing and Storage in Cloud Computing Abstract PDF
PICHIKA MOOLESWARA RAO, V G L NARASAMBA
 
Vol 4, No 6 (2016): October - November 2016 IMPORTANT-COMBINED ENCODING FOR ASCENDABLE DATA SHARING IN CLOUD STORAGE Abstract PDF
Vempuluri Venkateswarlu, N Venkatadri
 
Vol 5, No 5 (2017): August - September 2017 FLEXIBLE DATA STORAGE, RUGGEDLY BEDECKED AND BRILLIANT IN CLOUD COMPUTING Abstract PDF
B. Madhava Sai Reddy, Y. Praveen Kumar
 
Vol 9, No 5 (2021): August - September 2021 Competent Encryption Framework Based Secure Access Mechanism for Cloud Data Services Abstract PDF
TATINI REETHIKA, SARAKULA DEVANAM PRIYA
 
Vol 9, No 1 (2021): December - January 2021 Identity And Influence Control For Cipher Schema For Defining Strings Abstract PDF
REDDY APPALASWAMY, B.S.S MONICA, GOPISETTI GURUKESAVA DASU
 
Vol 4, No 5 (2016): August - September 2016 A SECURE MECHANISM FOR PROVIDING A HACK FREE MESH IN OPEN NETS Abstract PDF
N. Sainath, P. Padmanabham, Swapna Manthani
 
Vol 5, No 4 (2017): June - July 2017 RESTRICTIVE CHARACTER-BASED ADVERTISE INTERMEDIARY RECONSTRUCTION AND ITS PETITION TO DISTORT EMAIL Abstract PDF
B. Jyothi, K. Vinay Kumar
 
Vol 5, No 2 (2017): February - March 2017 MEASURED SECURITY FEATURES IMPLEMENTATION IN CLOUD ENVIRONMENT Abstract PDF
Chandhini K
 
Vol 4, No 5 (2016): August - September 2016 PRIVACY AUDITING AND DEDUPLICATING DATA WITH SECCLOUD IN CLOUD COMPUTING Abstract PDF
K. Ravi Prakash, T. Ravindar Reddy
 
Vol 5, No 4 (2017): June - July 2017 DISTINCTIVENESS-BASED KEY-LEGITIMATE AND KEY EXCHANGE PROTOCOLS Abstract PDF
D. Srija, Dr. R.China Appala Naidu
 
Vol 4, No 1 (2016): December - January 2016 A LITERATURE STUDY ON PARALLEL KEY CRYPTOGRAPHIC ALGORITHM Abstract PDF
Amalna Jose
 
Vol 5, No 1 (2017): December - January 2017 COMMUNICATIVE AND PROFICIENT DATA ENTRÉE MANAGE FOR MULTI RIGHTS CLOUD Abstract PDF
A.Divya Bharathi, Syed. Mazharuddin
 
Vol 6, No 3 (2018): April - May 2018 A NOVEL AND CAPABLE SCHEME ASSURANCE DATA PRIVACY OF ENCRYPTION CATEGORY Abstract PDF
B. Kavitha, Dr. Y.Ravi Kumar
 
Vol 4, No 5 (2016): August - September 2016 AVOIDING INTERMITTENT NET CONNECTIVITY ON BATTLE REGIONS Abstract PDF
Arjun ., M. Naresh Choudary
 
Vol 5, No 4 (2017): June - July 2017 A PROFICIENT FILE LADDER ABE TECHNIQUE IN CLOUD SERVER Abstract PDF
P. Vasanthi, J.Madhan Kumar
 
Vol 3, No 6 (2015): October - November 2015 IMPLEMENTATION OF A SCALABLE APPROACH OF IMAGE TRANSMISSION Abstract PDF
Priyanka Mettu, P.G.K Sirisha
 
Vol 5, No 6 (2017): October - November 2017 SEARCH FOR SYNCHRONIZED KEYWORDS USING THE SELECTED LAB FEATURE AND ENABLE RE CRYPTO SYSTEM FOR ELECTRONIC HEALTH CLOUDS Abstract PDF
Sattenapalli Hari Babu, B. Nagaraju Naik
 
Vol 4, No 5 (2016): August - September 2016 A CUMULATIVE KEY FOR FLEXIBLE ADOPTIONS OF CODE TEXT GROUP Abstract PDF
Nagababu Morampudi, A. Sreenivas Rao
 
Vol 5, No 4 (2017): June - July 2017 PRIVACY DISPERSED DATA FINDING WITH BROADCASTING IN WSNS Abstract PDF
Bunga Rajesh, Sahu Smita Rani
 
Vol 3, No 5 (2015): August - September 2015 PROVISION OF AN IMPROVISED SYSTEM FOR MANAGING PRIVACY OF LOCATIONS Abstract PDF
Naveen Yerramshetti
 
Vol 11, No 3 (2023): April - May 2023 An Intricate Network Sharing Protocol For Open Networks With Several Hierarchies Abstract PDF
SANDEEP AGARWALLA, PRIYANKA ROY, Dr. B.VENU KUMAR
 
Vol 4, No 6 (2016): October - November 2016 A WELL-ORGANIZED PREVENTIVE SCHEME FOR KGA USING HASH CODES Abstract PDF
Suneetha Thaduri, Hyma Birudaraju
 
Vol 5, No 5 (2017): August - September 2017 COMBINATION KEYWORD QUERIES WITH SELECTED TESTER AND TIMING FACILITATE IN ALTERNATIVE RECRYPTOGRAPY FUNCTION Abstract PDF
Santhapuram Srilatha, B. Nageswara Rao
 
Vol 4, No 5 (2016): August - September 2016 COMPUTING PRECISION SIGNIFICANCE SCORE BETWEEN ENCRYPTED INDEX AND QUERY PATHS Abstract PDF
D. Umamaheswari, A. Sreenivas Rao
 
Vol 5, No 3 (2017): April - May 2017 A PRIVACY AND DYNAMIC MULTI-KEYWORDS RANKED SEARCH SCHEME OVER CLOUD DATA ENCRYPTED Abstract PDF
G. Kavitha, K Surendra Reddy
 
Vol 3, No 3 (2015): April - May 2015 OVERVIEW TOWARDS STABILIZING OF DATA STORAGE IN CLOUD SYSTEM Abstract PDF
S. Narendar, U. Sivaji
 
Vol 10, No 2 (2022): February - March 2022 A Protected And Lightweight Data Distribution Program For Mobile Cloud Computing Abstract PDF
GUNDEBOINA NAGARAJU, G RAVI
 
Vol 4, No 6 (2016): October - November 2016 AN ENCRYPTION SCHEME WITH SUPPORTABLE ALLOCATION IN CLOUD COMPUTING Abstract PDF
Mamidi Swetha, Y.Jeevan Nagendra Kumar
 
Vol 5, No 5 (2017): August - September 2017 COMBINATION KEYWORD SEARCH WITH SELECTED TESTER AND TIMING FACILITATE ALTERNATIVE RE ENCRYPTION PURPOSE FOR HEALTH CLOUDS Abstract PDF
Bathoju Ashwini, Dr. Ravi Mathey
 
Vol 4, No 5 (2016): August - September 2016 ELEVATING THE PROBLEMS OF LINEAR SEARCHABLE CIPHERTEXT ON LARGE-SCALE DATABASE Abstract PDF
Mukta Varsha, K. Ramana Reddy
 
Vol 5, No 3 (2017): April - May 2017 DUAL SERVER PASSWORD VALIDATION KEYWORD SWAPPING RULES Abstract PDF
Bakka Shalini, K. Chandrakala
 
Vol 4, No 4 (2016): June - July 2016 FRAGMENT-VISIBLE MOSAIC IMAGES BY COLOR TRANSFORMATIONS Abstract PDF
S. Mahesh, Duda Prasad
 
Vol 5, No 3 (2017): April - May 2017 INTEGRATED KEY SEARCH WITH SELECTED SUPPORTER AND TEMPORAL ARRANGEMENT ACTIVATED CONCEAL RE-FORMATION UTILITY FOR ON-LINE HEALTH RECORDS Abstract PDF
Naveen Kumar M A, T. Geetha Lakshmi
 
Vol 2, No 6 (2014): October - November 2014 A NOVEL APPROACH TO POLICY BASED SIMILARITY IN SUBSCRIPTION IMPLICATION TO INITIATOR FOR MOBILE SOCIAL NETWORKS (MSNS) Abstract
B. Subrahamanyam, M.V. Satyanarayana
 
Vol 4, No 5 (2016): August - September 2016 ANONYMOUS THUMB IMPRESSION TECHNOLOGY FOR LEGAL DISTRIBUTION OF HYPER DATA Abstract PDF
Bisapongu Spandana, T. Shesagiri
 
Vol 5, No 5 (2017): August - September 2017 SEARCH FOR HARMONIZED KEYWORDS USING THE VOTED LAB FEATURE AND ALLOW RE CRYPTOSYSTEM FOR ELECTRONIC HEALTH CLOUDS Abstract PDF
M. Arvindhan, B.Bharathi Kannan, G S Pradeep Ghantasala
 
Vol 4, No 4 (2016): June - July 2016 DYNAMIC MULTI-KEYWORD RANKING SCHEME ON ENCRYPTED CLOUD DATA Abstract PDF
K. Narendra, G K V Narasimhareddy
 
Vol 5, No 3 (2017): April - May 2017 A NON-ISOLATION ARRANGEMENT OF DATA FOR DIGGING Abstract PDF
G.D. Marykeerthana, K. Narsimhulu
 
Vol 2, No 5 (2014): August - September 2014 EXPOSURE TOWARDS DATA COLORING IN RESPONSIBLE COMPUTING Abstract PDF
Renuka Devi Malige, Ch. Kiran
 
Vol 9, No 5 (2021): August - September 2021 Decentralizing Multi-Authority Attribute-based Data Sharing Scheme in Cloud computing Abstract PDF
JEEDIGUNTA SAI DIVYA, V.G.L NARASAMBA
 
Vol 4, No 5 (2016): August - September 2016 CONSENTING ALL LOCATION-QUERIES TO BE ASSESSED APPROPRIATELY BY THE SERVER Abstract PDF
G. Shravanya, Ch. China Subba Reddy, T. Shesagiri
 
Vol 4, No 4 (2016): June - July 2016 FLEXIBLE DATA SHARING IN STORAGE SYSTEMS OF CLOUD COMPUTING Abstract PDF
Bandaru Ravi Teja, K.Ashok Kumar
 
Vol 5, No 3 (2017): April - May 2017 MIXTURE CONVERSION WITH CONFIRMABLE ALLOCATION IN CLOUD USING CP-ABE SCHEM Abstract PDF
A.M. Rangaraj, L. Bhargav
 
Vol 2, No 2 (2014): February - March 2014 ROBUST AND RESOURCEFUL SINGLE SIGN-ON SCHEME FOR SECURE ENCRYPTION OF USER CREDENTIAL Abstract PDF
E.Venkata Ramana, Dr. D. Vasumathi
 
Vol 4, No 5 (2016): August - September 2016 PROTECTED FACTS RECOVERY USED FOR DECENTRALIZED INTERFERENCE CHARITABLE SERVICES NETWORKS Abstract PDF
Pavani Gottimukkala, E. Raveendra Reddy
 
Vol 5, No 5 (2017): August - September 2017 FILE SERIES EFFECTIVELY SEQUENCING CHARACTER-BASED ENCRYPTION IN CLOUD COMPUTING Abstract PDF
Sana Ali, Mohd Arshad Hussain
 
Vol 4, No 4 (2016): June - July 2016 A NOVEL STUDY FOR MANAGING PRIVACY OF DATA AND USER IN ACCESS CONTROL METHODS Abstract PDF
M. Subhashini, N. Sujatha
 
Vol 5, No 2 (2017): February - March 2017 A SECURE AND DYNAMIC MULTI-WATCHPHRASE RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Abstract PDF
A.M. Rangaraj, S. Palani, P Yasmin Bhanu
 
Vol 2, No 1 (2014): December - January 2014 SHIELDING OF HEALTH RECORDS CONFIDENTIALITY IN CLOUD COMPUTING Abstract PDF
Swathi Lakshmi Rangudu, Ch.Subba Reddy, T. Shesagiri
 
Vol 6, No 3 (2018): April - May 2018 FIND KEY TO EFFICIENT AND EXPRESSIVE WAY AROUND DATA ENCRYPTION IN THE CLOUD Abstract PDF
D. Dhanalakshmi, Y.Rajesh Babu
 
Vol 4, No 4 (2016): June - July 2016 BUILDING OF A KEY MANAGEMENT APPROACH OF EFFICIENT COMMUNICATIONS IN WIRELESS SYSTEMS Abstract PDF
K. Hymavathi, K.Ashok Kumar
 
Vol 5, No 2 (2017): February - March 2017 ENSURED DATA RECOVERY FOR LOCALIZED INTERRUPTION SYMPATHETIC MILITARY NETWORKS Abstract PDF
Mis.M.Jerusha Blessy, Prof.D.V. Rajesh Babu
 
Vol 6, No 3 (2018): April - May 2018 COMPATIBILITY WITH THE PROXY AGENT HAS BEEN TESTED THROUGH TRIAL AND TIME THAT WAS CHOSEN FOR EMAIL MESSAGES Abstract PDF
B. Anusha, J. Vidya
 
Vol 4, No 5 (2016): August - September 2016 A LITERATURE SURVEY ON A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERFACES Abstract PDF
K. Spandana, T. Neetha
 
Vol 5, No 4 (2017): June - July 2017 PUBLIC-KEY ENCRYPTION WITH KEY PURSUE SURE DISTRACT STORAGE IN DOUBLE SERVER Abstract PDF
Guntamukkala P Kumar, P. Balakeshava Reddy
 
Vol 4, No 2 (2016): February - March 2016 AN EFFECTIVE APPROACH FOR HIDING ENCRYPTED MESSAGES WITH NEURAL KEY USING LSB IMAGE STEGANOGRAPHY Abstract PDF
C.Immaculate Mary, P. Roshni Mol
 
0 - 0 of 61 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"



Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.