|
Issue |
Title |
|
Vol 3, No 13 (2016): Vol-3_Issue-13_September_2016 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
Abstract
PDF
|
Mr. M.Praneeth Kumar, Mr. K. Raju |
|
Vol 3, No 18 (2016): Vol-3_Issue-18_December_2016 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud |
Abstract
PDF
|
A. PARIJATHA, B. SUMAN |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups In the Cloud |
Abstract
PDF
|
Ms Bharathi, M. Veeresh Babu |
|
Vol 6, No 10 (2019): Vol-6-Issue-10-September-2019 |
A Secure Cloud Storage Based Multi-Server Public Key Encoding for Keyword Word |
Abstract
PDF
|
Mohammed Abdul Samad, MdAteeq Ur Rahman |
|
Vol 2, No 10 (2015): VOL-2_ISSUE-10_October_2015 |
A Secure Crop Medical Image Watermarking Technique |
Abstract
PDF
|
L. Munichandra Reddy, N.V. Raghava Swamy |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
A Secure E-Learning using Data Mining Techniques and Concepts |
Abstract
PDF
|
S Sreeja, Ankita Sharma |
|
Vol 6, No 7 (2019): Vol-6-Issue-7-June-2019 |
A Secure Information Distributed Scheme for Portable Cloud Computing |
Abstract
PDF
|
MAHANTI SRIRAMULU, DODDI SUNIL, SIVVALA RAMABABU |
|
Vol 6, No 7 (2019): Vol-6-Issue-7-June-2019 |
A Secure Information Distributed Scheme for Portable Cloud Computing |
Abstract
PDF
|
MAHANTI SRIRAMULU, DODDI SUNIL, SIVVALA RAMABABU |
|
Vol 4, No 9 (2017): Vol-4_Issue-09_August_2017 |
A Secure Interference-Recognition Scheme for Mobile Ad Hoc Networks |
Abstract
PDF
|
A. Anjaiah, A. Govardhan |
|
Vol 2, No 12 (2015): VOL-2_ISSUE-12_December_2015 |
A Secure Intrusion Detection for Centralized MANET |
Abstract
PDF
|
Viramosu. Gayathri, M. Santhoshini |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
A Secure Iot Based Modern Health Care System Using Body Sensor Networks |
Abstract
PDF
|
Mosin. S K, Vinatha. G |
|
Vol 3, No 17 (2016): Vol-3_Issue-17_November_2016 |
A Secure Mechanism for Public Auditing and Retrieving Users Cloud Data by means of Multiple Ranking System |
Abstract
PDF
|
Kamarajugadda Vasuki Lakshmi, B. Jyothi |
|
Vol 4, No 10 (2017): Vol-04_Issue-10_September_2017 |
A Secure Method for Routing Queries and Dynamic TTL-Based Search in P2P Networks |
Abstract
PDF
|
Geereddy Jayanthi, P Pedda Sadhu Naik |
|
Vol 4, No 9 (2017): Vol-4_Issue-09_August_2017 |
A Secure Multi Copy Dynamic Data Posession Using Proxy Server in Cloud Computing |
Abstract
PDF
|
N. Sravya, G. Vijay Kumar |
|
Vol 4, No 6 (2017): Vol-04_Issue-06_May_2017 |
A Secure Multimedia Data Storage in Cloud |
Abstract
PDF
|
YELISETTI VINOD, SHAIK ABDULNABI |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
A Secure Off-Line Micro-Payment Solution Resilient To Pos Data Violation |
Abstract
PDF
|
KAMAGARI PREETHI, A.SANDHYA RANI |
|
Vol 5, No 16 (2018): Vol-05-Issue-16-June-2018 |
A Secure Off-Line Micro-Payment Solution Resilient To Pos Data Violation |
Abstract
PDF
|
Kamagari Preethi, A.Sandhya Rani |
|
Vol 4, No 6 (2017): Vol-04_Issue-06_May_2017 |
A Secure On-Line University Clearance System for Graduating Students Using Finger Print Technique for Security Authentication. |
Abstract
PDF
|
ONUNGWE O.H, NWACHUKWU E.O |
|
Vol 5, No 4 (2018): Vol-05-Issue-04-February-2018 |
A Secure Reversible Data Hiding With Optimal Value Transfer |
Abstract
PDF
|
Chinta B D China Veer Reddy, A.Veerabhadra Rao |
|
Vol 4, No 9 (2017): Vol-4_Issue-09_August_2017 |
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Attribute-Set-Based Encryption (ABE) in Cloud Computing |
Abstract
PDF
|
Mr.Mekala Veeranjaneyulu, T. Kishore Babu |
|
Vol 3, No 10 (2016): Vol-3_Issue-10_June_2016 |
A Secure Scheme for Sensing Background Forgery and Packet Dropattacks in WSN |
Abstract
PDF
|
P. SURESH, . N. SUJATHA |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
A Secured Authenticated Key Exchange Protocols for Parallel Network File Systems |
Abstract
PDF
|
Malavathu Tejasri, K. Srinivas, Samrat Krishna |
|
Vol 5, No 01 (2018): Vol-05-Issue-01-January-2018 |
A Secured Dictionary Based Provenance Compression for Wireless Sensor Networks |
Abstract
PDF
|
Navaneeth Mola, Arpitha Kotte |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
A Security Aspect In Emergency Driving |
Abstract
|
Jangata Manjula, Venkadari Sowmya |
|
Vol 4, No 10 (2017): Vol-04_Issue-10_September_2017 |
A Security Framework in Cloud Computing Infrastructure |
Abstract
PDF
|
G. Radha Devi |
|
1101 - 1125 of 15699 Items |
<< < 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 > >> |