Search Results


Revise Search
 
Issue Title
 
Vol 1, No 5 (2013): August -September DATA OUTSOURCING BASED SIMILARITY FUSION Abstract PDF
S. Pradeep Kumar Reddy, M. Raghavendra Rao
 
Vol 5, No 3 (2017): April - May 2017 CHARACTERISED BASED IMAGE SEARCH BY WEB RE-STATUS Abstract PDF
Konderu Prashanth, K. Tejaswini
 
Vol 4, No 5 (2016): August - September 2016 AN AUTOMATED SOLUTION FOR AVOIDING ENVIRONMENTAL POLLUTION ON ROADS Abstract PDF
Teepireddy Yellareddy, M. Govind Raj, P. Suresh Kumar
 
Vol 5, No 3 (2017): April - May 2017 DETERMINING MULTI - PARTY SECURITY IN OSN Abstract PDF
Rafiqha Kausar, S. Vineela Krishna
 
Vol 4, No 6 (2016): October - November 2016 PRIVILEGED INFORMATION MANIPULATION STRATEGY IN OPEN NETWORK Abstract PDF
G. Priyanka, S. Rajesh, Prof. Dr A. Kiranmayee
 
Vol 4, No 6 (2016): October - November 2016 PRIVACY-PRESERVING DATA TRANSMISSION PROTOCOL FOR WIRELESS MEDICAL SENSOR DATA Abstract PDF
A. Gajender, M. Nagaraju
 
Vol 4, No 6 (2016): October - November 2016 PRIVACY PRESERVING DATA MINING TECHNIQUES USING RECENT ALGORITHMS Abstract PDF
B. Govinda Lakshmi
 
Vol 4, No 5 (2016): August - September 2016 A TOOL FOR PROVIDING SECURITY FOR GRAPHIC DATA ON CS Abstract PDF
Y. Srilaxmi, P. Surekha
 
Vol 4, No 6 (2016): October - November 2016 USER PRIVACY SELECTION CRITERIA ON PERSONAL DATA IN PUBLIC NETS Abstract PDF
Annapureddy Anji Reddy, P. Rambabu
 
Vol 5, No 4 (2017): June - July 2017 IMPLANTING FOR SEVERAL SOCIAL GATHERING SECURITY CLASHES IN ONLINE MEDIA Abstract PDF
Bonthagorla Manikanta, Ramesh Babu Gudipu
 
Vol 4, No 4 (2016): June - July 2016 PROVIDING A FLEXIBLE AND COSTLESS SOLUTION FOR TRANSITIONAL SETS Abstract PDF
Amrutha Mary, J.Arthi Jaya Kumari
 
Vol 4, No 6 (2016): October - November 2016 CONFIDENTIALITY PLANNING IMPLICATION OF USER-UPLOADED IMAGES ON CONTENTED DISTRIBUTION SITES Abstract PDF
Sweta Sri, Dr R China Appala Naidu
 
Vol 4, No 6 (2016): October - November 2016 A WIDE RANGE OF CELLULAR INFRASTRUCTURE TO ALLEVIATE TRAFFIC CONGESTION Abstract PDF
B. Sai Krishna, P. Gangadhar
 
Vol 2, No 3 (2014): April - May 2014 HOP-BY-HOP MESSAGE VALIDATION AND SOURCE PRIVACY IN WIRELESS SENSOR NETWORKS Abstract PDF
Gopirajan. P.V, S. Rajesh
 
Vol 9, No 6 (2021): October - November 2021 Secure Access control Technology towards Data Sharing and Storage in Cloud Computing Abstract PDF
PICHIKA MOOLESWARA RAO, V G L NARASAMBA
 
Vol 4, No 5 (2016): August - September 2016 A SECURE MECHANISM FOR PROVIDING A HACK FREE MESH IN OPEN NETS Abstract PDF
N. Sainath, P. Padmanabham, Swapna Manthani
 
Vol 4, No 4 (2016): June - July 2016 FLEXIBLE DATA SHARING IN STORAGE SYSTEMS OF CLOUD COMPUTING Abstract PDF
Bandaru Ravi Teja, K.Ashok Kumar
 
Vol 4, No 6 (2016): October - November 2016 SECURING PERFORMANCE OF THE NETWORK IN VIEW SELECTIVE DROPS Abstract PDF
B. Anusha, Y Sravana Sandhya
 
Vol 2, No 1 (2014): December - January 2014 AN APPROACH TOWARDS EXPLOITATION OF SOCIAL COMMUNICATIONS IN MOBILE SYSTEMS Abstract PDF
Maddali Dhanesh, Prakash Jordan Jency.J
 
Vol 9, No 5 (2021): August - September 2021 Secure Searching Mechanism for Cloud Computing Based Cloud Storage System Abstract PDF
M.PRIYANKA REDDY, YEDIDA RAMA KRISHNA
 
Vol 4, No 5 (2016): August - September 2016 A COMPREHENSIVE SURVEY ON PRIVACY PRESERVING DISTRIBUTED DATA MINING WITH EVOLUTIONARY COMPUTING Abstract PDF
J. Aruna Santhi
 
Vol 5, No 3 (2017): April - May 2017 A FRAMEWORK OF ADAPTED TRAVEL REFERENCES IN ONLINE SOCIAL MEDIA Abstract PDF
A.Sai Jyotsna, A. Sangeetha, Venugopal Chetukuri
 
Vol 4, No 4 (2016): June - July 2016 A NOVEL STUDY FOR MANAGING PRIVACY OF DATA AND USER IN ACCESS CONTROL METHODS Abstract PDF
M. Subhashini, N. Sujatha
 
Vol 4, No 6 (2016): October - November 2016 A UNIQUE ASSISTANCE THAT PROVIDES GUARANTEE THE HIDING OF DATA Abstract PDF
Chillakuru Prathima, N Venkatadri
 
Vol 9, No 5 (2021): August - September 2021 Multi - owner Secure Data Sharing in Cloud Computing Environment Abstract PDF
PATHIVADA ESTHERU RANI, POTHULA SRI RAMAKRISHNA
 
Vol 4, No 4 (2016): June - July 2016 RECOGNIZING ATTACKS OF PACKET DROPPING WITHIN WIRELESS SYSTEMS Abstract PDF
G.Sridhar Reddy, V.N.Venu Gopal
 
Vol 1, No 3 (2013): APRIL - MAY DISTRIBUTED DETECTION OF SAFE NODE CONFINE ATTACKS IN WIRELESS SENSOR NETWORKS Abstract PDF
Y. Mamatha, Jyothsna Bandreddi
 
Vol 6, No 3 (2018): April - May 2018 CLOUD SERVICES WITH SECURITY PRESERVATION AND ADMISSION CONTROL SCHEME Abstract PDF
E. Sulamithi, Pathri Dheeraja
 
Vol 4, No 5 (2016): August - September 2016 DEPLOYING AN UNIQUE CONTROL SCHEME TO REDUCE THE IDENTITY LEAKAGE Abstract PDF
Z. Noor Fatima, B.V.S. P.Pavan Kumar
 
Vol 5, No 2 (2017): February - March 2017 DISCOVERY-MAINTAINING AND DISHONEST RECOGNITION OF PACKET REDUCING ATTACKS IN WIRELESS AD HOC NETWORKS Abstract PDF
Kollipakula Ramadevi, Fareeda Shaik, Challa Bhaskar Rao
 
Vol 3, No 5 (2015): August - September 2015 COLLABORATIVE TAGGING USING CAPTCHA Abstract PDF
Me.Jakeera Begum, M.Venkata Rao
 
Vol 5, No 4 (2017): June - July 2017 CONCEALMENT SECURITY FOR MOBILE THERAPEUTIC FEELER DATA Abstract PDF
K. Nagamma, K.Ashok Babu
 
Vol 4, No 5 (2016): August - September 2016 INTRODUCING A VARIETY OF ENCRYPTION POLICIES TO PROTECT DATA CONTENTS Abstract PDF
Ganam Swathi, Ch. Vijayakumari
 
Vol 5, No 2 (2017): February - March 2017 A NOVEL APPROACH FOR MULTI SHARING AUTHENTICATED FILTERED DATA FOR BIG DATA STORAGE Abstract PDF
Tammireddy Supriya, Paricherla Mutyalaiah, Challa Bhaskar Rao
 
Vol 3, No 5 (2015): August - September 2015 PROVISION OF AN IMPROVISED SYSTEM FOR MANAGING PRIVACY OF LOCATIONS Abstract PDF
Naveen Yerramshetti
 
Vol 5, No 4 (2017): June - July 2017 TRAVEL DE ASSOCIATION PROCEDURE FOR CONTRADICT A INCLUSIVE EAVESDROPPER IN WSNS Abstract PDF
M. Sushma, Dr. R.China Appala Naidu
 
Vol 5, No 1 (2017): December - January 2017 OPEN VERIFICATION CLOUD DATA USING ABE SCHEME Abstract PDF
Sai Krishna Illendula, B.Kumar Swamy
 
Vol 3, No 5 (2015): August - September 2015 EMPLOYING OF INNOVATIVE APPROACH FOR MANAGING OF DATA ON CLOUD SERVER Abstract PDF
Naveen Yerramshetti
 
Vol 5, No 1 (2017): December - January 2017 CONFIDENTIALITY-DESTRUCTIVE AND DISHONEST DISCOVERY OF PACKET FALLING ASSAULTS IN WIRELESS AD HOC NETWORKS Abstract PDF
Shaik Shabbir Basha, V. Venkateswarlu
 
Vol 2, No 5 (2014): August - September 2014 PRIVACY PRESERVED AND SECURE PROFILE MATCHING BASED ON PROFESSION ATTRIBUTES Abstract
Golla Saidarao, Rajesh Ghanta
 
Vol 4, No 5 (2016): August - September 2016 SURVEY IMAGE EXCHANGE AND CONTROL DECISIONS PRIVACY OSN Abstract PDF
K. Jaya Sri, T. Neetha
 
Vol 5, No 4 (2017): June - July 2017 AN APPROACH WITH CAPABLE SECURITY RANKED KEYWORD SEARCH TECHNIQUE Abstract PDF
S. Komali, M. Karuna
 
Vol 4, No 4 (2016): June - July 2016 CLOUD ENVIRONMENT USING MANY PHRASAL WORDS CONCEALMENT PRESERVING TO PERFORM SAFE SEARCH Abstract PDF
N. Grace Naomi, Dr. G. Charles Babu, Dr. Ch. Ramesh Babu
 
Vol 5, No 1 (2017): December - January 2017 SEPARATENESS-DESTRUCTIVE ENCRYPTION CHARACTERS MULTIPLE-INVOLVEMENT MECHANISM FOR LARGE INFORMATION STORAGE Abstract PDF
Dr. B Vamsee Mohan, Mogili Baby Kalyani
 
Vol 2, No 5 (2014): August - September 2014 FOP: FIREWALL OPTIMIZATION PROTOCOL FOR CROSS-DOMAIN PRIVACY PRESERVING Abstract
Venkata Varma Vegiraju, M. S. V. V. Ramesh, D. D. D. Suribabu
 
Vol 4, No 5 (2016): August - September 2016 FUZZY-BASED CRYPTOSYSTEM FOR REVOLUTIONARY OPEN NETS Abstract PDF
Rendla Sagar, B. Ravi Kumar
 
Vol 5, No 4 (2017): June - July 2017 SECURITY ENABLE AND AUTHENTIC FINDING OF FALLING PEACE ATTACKS IN WANET Abstract PDF
A. Anjaiah, Dr. A. Govardhan
 
Vol 4, No 4 (2016): June - July 2016 SECURE AND PRIVACY PRESERVING SMARTPHONE BASED TRAFFIC INFORMATION SYSTEM Abstract PDF
Kalluri Anil Kumar, K. Divya
 
Vol 2, No 5 (2014): August - September 2014 EXPOSURE TOWARDS DATA COLORING IN RESPONSIBLE COMPUTING Abstract PDF
Renuka Devi Malige, Ch. Kiran
 
Vol 4, No 5 (2016): August - September 2016 ANONYMOUS THUMB IMPRESSION TECHNOLOGY FOR LEGAL DISTRIBUTION OF HYPER DATA Abstract PDF
Bisapongu Spandana, T. Shesagiri
 
Vol 5, No 3 (2017): April - May 2017 TOUR PACKAGE PROPOSAL BASED ON USER INTERESTS IN ONLINE SOCIAL MEDIA Abstract PDF
Sri. K.Siva Kumar, Sri. P.Rama Krishna, Dr.Shaheda Akthar, Dr.Shaik Mohammad Rafi
 
Vol 4, No 4 (2016): June - July 2016 A MECHANISM OF CLOUDS FAITH CONTROLLING SERVICE FOR REAL-TIME READINESS Abstract PDF
B. Ramakrishna Teja, B.V. Srinivasulu
 
Vol 4, No 6 (2016): October - November 2016 DISCOVERY CONSERVING HIERARCHICAL MULTIPLE KEY SEARCH FOR SEVERAL FACT HOLDERS IN CLOUD COMPUTING Abstract PDF
Mabasha Shaik, Jetty Madhan Kumar
 
Vol 2, No 3 (2014): April - May 2014 ASSESSMENT OF PROSPECTIVE ADVERSARIES IN DATA PUBLISHING Abstract PDF
Ch. Anjaiah, P.Niranjan Kumar, Dr.M.V.Siva Prasad
 
Vol 11, No 3 (2023): April - May 2023 Cloud Storage System Towards Dynamic Encrypted Cloud Data With Symmetric-Key Based Verification Abstract PDF
KAKARA MADHUSUDHANA RAJU, B. MAHA LAKSHMI RAO
 
Vol 4, No 5 (2016): August - September 2016 CONSENTING ALL LOCATION-QUERIES TO BE ASSESSED APPROPRIATELY BY THE SERVER Abstract PDF
G. Shravanya, Ch. China Subba Reddy, T. Shesagiri
 
Vol 5, No 3 (2017): April - May 2017 TRAFFIC DEDUCTION SCHEME WITH MANIPULATING ISSUES IN WSNS Abstract PDF
Kaja Mahammad Akram Ali, Venkata Ramaiah Subbaiah
 
Vol 4, No 4 (2016): June - July 2016 A COMBINED APPROACH & SERVICE ORIENTED TECHNOLOGIES THAT ASSISTS SPEED DATA ACCESS OF RESOURCES ON THE NET Abstract PDF
Shaik Shabir Ahamed, Shaik Jaffar Hussain
 
0 - 0 of 58 Items

Search tips:

  • Search terms are case-insensitive
  • Common words are ignored
  • By default only articles containing all terms in the query are returned (i.e., AND is implied)
  • Combine multiple words with OR to find articles containing either term; e.g., education OR research
  • Use parentheses to create more complex queries; e.g., archive ((journal OR conference) NOT theses)
  • Search for an exact phrase by putting it in quotes; e.g., "open access publishing"
  • Exclude a word by prefixing it with - or NOT; e.g. online -politics or online NOT politics
  • Use * in a term as a wildcard to match any sequence of characters; e.g., soci* morality would match documents containing "sociological" or "societal"



Copyright © 2012 - 2023, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.