Revise Search
Issue | Title | |
Vol 1, No 5 (2013): August -September | DATA OUTSOURCING BASED SIMILARITY FUSION | Abstract PDF |
S. Pradeep Kumar Reddy, M. Raghavendra Rao | ||
Vol 5, No 3 (2017): April - May 2017 | CHARACTERISED BASED IMAGE SEARCH BY WEB RE-STATUS | Abstract PDF |
Konderu Prashanth, K. Tejaswini | ||
Vol 4, No 5 (2016): August - September 2016 | AN AUTOMATED SOLUTION FOR AVOIDING ENVIRONMENTAL POLLUTION ON ROADS | Abstract PDF |
Teepireddy Yellareddy, M. Govind Raj, P. Suresh Kumar | ||
Vol 5, No 3 (2017): April - May 2017 | DETERMINING MULTI - PARTY SECURITY IN OSN | Abstract PDF |
Rafiqha Kausar, S. Vineela Krishna | ||
Vol 4, No 6 (2016): October - November 2016 | PRIVILEGED INFORMATION MANIPULATION STRATEGY IN OPEN NETWORK | Abstract PDF |
G. Priyanka, S. Rajesh, Prof. Dr A. Kiranmayee | ||
Vol 4, No 6 (2016): October - November 2016 | PRIVACY-PRESERVING DATA TRANSMISSION PROTOCOL FOR WIRELESS MEDICAL SENSOR DATA | Abstract PDF |
A. Gajender, M. Nagaraju | ||
Vol 4, No 6 (2016): October - November 2016 | PRIVACY PRESERVING DATA MINING TECHNIQUES USING RECENT ALGORITHMS | Abstract PDF |
B. Govinda Lakshmi | ||
Vol 4, No 5 (2016): August - September 2016 | A TOOL FOR PROVIDING SECURITY FOR GRAPHIC DATA ON CS | Abstract PDF |
Y. Srilaxmi, P. Surekha | ||
Vol 4, No 6 (2016): October - November 2016 | USER PRIVACY SELECTION CRITERIA ON PERSONAL DATA IN PUBLIC NETS | Abstract PDF |
Annapureddy Anji Reddy, P. Rambabu | ||
Vol 5, No 4 (2017): June - July 2017 | IMPLANTING FOR SEVERAL SOCIAL GATHERING SECURITY CLASHES IN ONLINE MEDIA | Abstract PDF |
Bonthagorla Manikanta, Ramesh Babu Gudipu | ||
Vol 4, No 4 (2016): June - July 2016 | PROVIDING A FLEXIBLE AND COSTLESS SOLUTION FOR TRANSITIONAL SETS | Abstract PDF |
Amrutha Mary, J.Arthi Jaya Kumari | ||
Vol 4, No 6 (2016): October - November 2016 | CONFIDENTIALITY PLANNING IMPLICATION OF USER-UPLOADED IMAGES ON CONTENTED DISTRIBUTION SITES | Abstract PDF |
Sweta Sri, Dr R China Appala Naidu | ||
Vol 4, No 6 (2016): October - November 2016 | A WIDE RANGE OF CELLULAR INFRASTRUCTURE TO ALLEVIATE TRAFFIC CONGESTION | Abstract PDF |
B. Sai Krishna, P. Gangadhar | ||
Vol 2, No 3 (2014): April - May 2014 | HOP-BY-HOP MESSAGE VALIDATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS | Abstract PDF |
Gopirajan. P.V, S. Rajesh | ||
Vol 9, No 6 (2021): October - November 2021 | Secure Access control Technology towards Data Sharing and Storage in Cloud Computing | Abstract PDF |
PICHIKA MOOLESWARA RAO, V G L NARASAMBA | ||
Vol 4, No 5 (2016): August - September 2016 | A SECURE MECHANISM FOR PROVIDING A HACK FREE MESH IN OPEN NETS | Abstract PDF |
N. Sainath, P. Padmanabham, Swapna Manthani | ||
Vol 4, No 4 (2016): June - July 2016 | FLEXIBLE DATA SHARING IN STORAGE SYSTEMS OF CLOUD COMPUTING | Abstract PDF |
Bandaru Ravi Teja, K.Ashok Kumar | ||
Vol 4, No 6 (2016): October - November 2016 | SECURING PERFORMANCE OF THE NETWORK IN VIEW SELECTIVE DROPS | Abstract PDF |
B. Anusha, Y Sravana Sandhya | ||
Vol 2, No 1 (2014): December - January 2014 | AN APPROACH TOWARDS EXPLOITATION OF SOCIAL COMMUNICATIONS IN MOBILE SYSTEMS | Abstract PDF |
Maddali Dhanesh, Prakash Jordan Jency.J | ||
Vol 9, No 5 (2021): August - September 2021 | Secure Searching Mechanism for Cloud Computing Based Cloud Storage System | Abstract PDF |
M.PRIYANKA REDDY, YEDIDA RAMA KRISHNA | ||
Vol 4, No 5 (2016): August - September 2016 | A COMPREHENSIVE SURVEY ON PRIVACY PRESERVING DISTRIBUTED DATA MINING WITH EVOLUTIONARY COMPUTING | Abstract PDF |
J. Aruna Santhi | ||
Vol 5, No 3 (2017): April - May 2017 | A FRAMEWORK OF ADAPTED TRAVEL REFERENCES IN ONLINE SOCIAL MEDIA | Abstract PDF |
A.Sai Jyotsna, A. Sangeetha, Venugopal Chetukuri | ||
Vol 4, No 4 (2016): June - July 2016 | A NOVEL STUDY FOR MANAGING PRIVACY OF DATA AND USER IN ACCESS CONTROL METHODS | Abstract PDF |
M. Subhashini, N. Sujatha | ||
Vol 4, No 6 (2016): October - November 2016 | A UNIQUE ASSISTANCE THAT PROVIDES GUARANTEE THE HIDING OF DATA | Abstract PDF |
Chillakuru Prathima, N Venkatadri | ||
Vol 9, No 5 (2021): August - September 2021 | Multi - owner Secure Data Sharing in Cloud Computing Environment | Abstract PDF |
PATHIVADA ESTHERU RANI, POTHULA SRI RAMAKRISHNA | ||
Vol 4, No 4 (2016): June - July 2016 | RECOGNIZING ATTACKS OF PACKET DROPPING WITHIN WIRELESS SYSTEMS | Abstract PDF |
G.Sridhar Reddy, V.N.Venu Gopal | ||
Vol 1, No 3 (2013): APRIL - MAY | DISTRIBUTED DETECTION OF SAFE NODE CONFINE ATTACKS IN WIRELESS SENSOR NETWORKS | Abstract PDF |
Y. Mamatha, Jyothsna Bandreddi | ||
Vol 6, No 3 (2018): April - May 2018 | CLOUD SERVICES WITH SECURITY PRESERVATION AND ADMISSION CONTROL SCHEME | Abstract PDF |
E. Sulamithi, Pathri Dheeraja | ||
Vol 4, No 5 (2016): August - September 2016 | DEPLOYING AN UNIQUE CONTROL SCHEME TO REDUCE THE IDENTITY LEAKAGE | Abstract PDF |
Z. Noor Fatima, B.V.S. P.Pavan Kumar | ||
Vol 5, No 2 (2017): February - March 2017 | DISCOVERY-MAINTAINING AND DISHONEST RECOGNITION OF PACKET REDUCING ATTACKS IN WIRELESS AD HOC NETWORKS | Abstract PDF |
Kollipakula Ramadevi, Fareeda Shaik, Challa Bhaskar Rao | ||
Vol 3, No 5 (2015): August - September 2015 | COLLABORATIVE TAGGING USING CAPTCHA | Abstract PDF |
Me.Jakeera Begum, M.Venkata Rao | ||
Vol 5, No 4 (2017): June - July 2017 | CONCEALMENT SECURITY FOR MOBILE THERAPEUTIC FEELER DATA | Abstract PDF |
K. Nagamma, K.Ashok Babu | ||
Vol 4, No 5 (2016): August - September 2016 | INTRODUCING A VARIETY OF ENCRYPTION POLICIES TO PROTECT DATA CONTENTS | Abstract PDF |
Ganam Swathi, Ch. Vijayakumari | ||
Vol 5, No 2 (2017): February - March 2017 | A NOVEL APPROACH FOR MULTI SHARING AUTHENTICATED FILTERED DATA FOR BIG DATA STORAGE | Abstract PDF |
Tammireddy Supriya, Paricherla Mutyalaiah, Challa Bhaskar Rao | ||
Vol 3, No 5 (2015): August - September 2015 | PROVISION OF AN IMPROVISED SYSTEM FOR MANAGING PRIVACY OF LOCATIONS | Abstract PDF |
Naveen Yerramshetti | ||
Vol 5, No 4 (2017): June - July 2017 | TRAVEL DE ASSOCIATION PROCEDURE FOR CONTRADICT A INCLUSIVE EAVESDROPPER IN WSNS | Abstract PDF |
M. Sushma, Dr. R.China Appala Naidu | ||
Vol 5, No 1 (2017): December - January 2017 | OPEN VERIFICATION CLOUD DATA USING ABE SCHEME | Abstract PDF |
Sai Krishna Illendula, B.Kumar Swamy | ||
Vol 3, No 5 (2015): August - September 2015 | EMPLOYING OF INNOVATIVE APPROACH FOR MANAGING OF DATA ON CLOUD SERVER | Abstract PDF |
Naveen Yerramshetti | ||
Vol 5, No 1 (2017): December - January 2017 | CONFIDENTIALITY-DESTRUCTIVE AND DISHONEST DISCOVERY OF PACKET FALLING ASSAULTS IN WIRELESS AD HOC NETWORKS | Abstract PDF |
Shaik Shabbir Basha, V. Venkateswarlu | ||
Vol 2, No 5 (2014): August - September 2014 | PRIVACY PRESERVED AND SECURE PROFILE MATCHING BASED ON PROFESSION ATTRIBUTES | Abstract |
Golla Saidarao, Rajesh Ghanta | ||
Vol 4, No 5 (2016): August - September 2016 | SURVEY IMAGE EXCHANGE AND CONTROL DECISIONS PRIVACY OSN | Abstract PDF |
K. Jaya Sri, T. Neetha | ||
Vol 5, No 4 (2017): June - July 2017 | AN APPROACH WITH CAPABLE SECURITY RANKED KEYWORD SEARCH TECHNIQUE | Abstract PDF |
S. Komali, M. Karuna | ||
Vol 4, No 4 (2016): June - July 2016 | CLOUD ENVIRONMENT USING MANY PHRASAL WORDS CONCEALMENT PRESERVING TO PERFORM SAFE SEARCH | Abstract PDF |
N. Grace Naomi, Dr. G. Charles Babu, Dr. Ch. Ramesh Babu | ||
Vol 5, No 1 (2017): December - January 2017 | SEPARATENESS-DESTRUCTIVE ENCRYPTION CHARACTERS MULTIPLE-INVOLVEMENT MECHANISM FOR LARGE INFORMATION STORAGE | Abstract PDF |
Dr. B Vamsee Mohan, Mogili Baby Kalyani | ||
Vol 2, No 5 (2014): August - September 2014 | FOP: FIREWALL OPTIMIZATION PROTOCOL FOR CROSS-DOMAIN PRIVACY PRESERVING | Abstract |
Venkata Varma Vegiraju, M. S. V. V. Ramesh, D. D. D. Suribabu | ||
Vol 4, No 5 (2016): August - September 2016 | FUZZY-BASED CRYPTOSYSTEM FOR REVOLUTIONARY OPEN NETS | Abstract PDF |
Rendla Sagar, B. Ravi Kumar | ||
Vol 5, No 4 (2017): June - July 2017 | SECURITY ENABLE AND AUTHENTIC FINDING OF FALLING PEACE ATTACKS IN WANET | Abstract PDF |
A. Anjaiah, Dr. A. Govardhan | ||
Vol 4, No 4 (2016): June - July 2016 | SECURE AND PRIVACY PRESERVING SMARTPHONE BASED TRAFFIC INFORMATION SYSTEM | Abstract PDF |
Kalluri Anil Kumar, K. Divya | ||
Vol 2, No 5 (2014): August - September 2014 | EXPOSURE TOWARDS DATA COLORING IN RESPONSIBLE COMPUTING | Abstract PDF |
Renuka Devi Malige, Ch. Kiran | ||
Vol 4, No 5 (2016): August - September 2016 | ANONYMOUS THUMB IMPRESSION TECHNOLOGY FOR LEGAL DISTRIBUTION OF HYPER DATA | Abstract PDF |
Bisapongu Spandana, T. Shesagiri | ||
Vol 5, No 3 (2017): April - May 2017 | TOUR PACKAGE PROPOSAL BASED ON USER INTERESTS IN ONLINE SOCIAL MEDIA | Abstract PDF |
Sri. K.Siva Kumar, Sri. P.Rama Krishna, Dr.Shaheda Akthar, Dr.Shaik Mohammad Rafi | ||
Vol 4, No 4 (2016): June - July 2016 | A MECHANISM OF CLOUDS FAITH CONTROLLING SERVICE FOR REAL-TIME READINESS | Abstract PDF |
B. Ramakrishna Teja, B.V. Srinivasulu | ||
Vol 4, No 6 (2016): October - November 2016 | DISCOVERY CONSERVING HIERARCHICAL MULTIPLE KEY SEARCH FOR SEVERAL FACT HOLDERS IN CLOUD COMPUTING | Abstract PDF |
Mabasha Shaik, Jetty Madhan Kumar | ||
Vol 2, No 3 (2014): April - May 2014 | ASSESSMENT OF PROSPECTIVE ADVERSARIES IN DATA PUBLISHING | Abstract PDF |
Ch. Anjaiah, P.Niranjan Kumar, Dr.M.V.Siva Prasad | ||
Vol 11, No 3 (2023): April - May 2023 | Cloud Storage System Towards Dynamic Encrypted Cloud Data With Symmetric-Key Based Verification | Abstract PDF |
KAKARA MADHUSUDHANA RAJU, B. MAHA LAKSHMI RAO | ||
Vol 4, No 5 (2016): August - September 2016 | CONSENTING ALL LOCATION-QUERIES TO BE ASSESSED APPROPRIATELY BY THE SERVER | Abstract PDF |
G. Shravanya, Ch. China Subba Reddy, T. Shesagiri | ||
Vol 5, No 3 (2017): April - May 2017 | TRAFFIC DEDUCTION SCHEME WITH MANIPULATING ISSUES IN WSNS | Abstract PDF |
Kaja Mahammad Akram Ali, Venkata Ramaiah Subbaiah | ||
Vol 4, No 4 (2016): June - July 2016 | A COMBINED APPROACH & SERVICE ORIENTED TECHNOLOGIES THAT ASSISTS SPEED DATA ACCESS OF RESOURCES ON THE NET | Abstract PDF |
Shaik Shabir Ahamed, Shaik Jaffar Hussain | ||
0 - 0 of 58 Items |
Search tips:
- Search terms are case-insensitive
- Common words are ignored
- By default only articles containing all terms in the query are returned (i.e., AND is implied)
- Combine multiple words with OR to find articles containing either term; e.g., education OR research
- Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
- Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
- Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
- Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"
Copyright © 2012 - 2023, All rights reserved.| ijitr.com
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.