|
Issue |
Title |
|
Vol 3, No 12 (2016): Vol-3_Issue-12_August_2016 |
Protecting Cloud Services Against Their Malicious Users |
Abstract
PDF
|
Ava Sunitha, P. Venkata Pratima, I. Satyanarayana |
|
Vol 2, No 10 (2015): VOL-2_ISSUE-10_October_2015 |
Protecting Privacy on Deduced Checking System for Data Stored Cloud |
Abstract
PDF
|
K Sowjanya, V. Sridhar Reddy |
|
Vol 1, No 9 (2014): Vol-1_Issue-9_October_2014 |
Protecting the Sensitive Information on Online Social Networks |
Abstract
PDF
|
N. Anjaiah, CH. Ravi |
|
Vol 1, No 10 (2014): Vol-1_Issue-10_November_2014 |
Protection against Client-Side Cross Side Scripting (XSS/CSS) |
Abstract
PDF
|
Utkarsh Kumar, Sujeet Kumar |
|
Vol 7, No 4 (2020): Vol-7-Issue-4-April-2020 |
Protection And Use Of Beneficial Insects |
Abstract
|
Khabibullayev Fayzulla Nabibullayevich |
|
Vol 2, No 9 (2015): VOL-2_ISSUE-09_September_2015 |
Protection Assessment of Design Classifiers under Attack |
Abstract
PDF
|
N. Venkatadri, N.V. Bhargava Reddy |
|
Vol 1, No 9 (2014): Vol-1_Issue-9_October_2014 |
Protection of Geographical Indication and Legal Framework in India |
Abstract
PDF
|
Paramita Ray, Jayanta Kumar Saha |
|
Vol 2, No 10 (2015): VOL-2_ISSUE-10_October_2015 |
Protection Preserving Secure Profile Coordinating in Mobile Gregarious Network |
Abstract
PDF
|
Pasunuri Vennala, M. Venkateshwara Rao |
|
Vol 7, No 10 (2020): Vol-7-Issue-10-October-2020 |
Protection Safeguarding Public Examining For Secure Distributed Storage |
Abstract
PDF
|
Ayesha Amreen, Dr. M. Jahir Pasha |
|
Vol 4, No 5 (2017): Vol-04_Issue-05_April_2017 |
Protective and Curative Effects of Afzelia africana Based diet on Alloxan induced Diabetic Rats |
Abstract
PDF
|
Ajayi O. B, Adegbaye O. B, Bello R. A |
|
Vol 6, No 10 (2019): Vol-6-Issue-10-September-2019 |
Protective Deduplication in support of Cloud Encrypted Data over data store using Attribute-Based Encryption |
Abstract
PDF
|
Nadia Mohammed Laique, M.A. Rawoof, Mohammed khaleel ahmed |
|
Vol 4, No 17 (2017): Vol-04-Issue-17-December-2017 |
Protective Selective Jamming Attack for 4G/LTE Networks |
Abstract
PDF
|
Kasimbee Shaik |
|
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 |
Proto-historic Indian Ecological Background: - A study |
Abstract
PDF
|
Dr.Dilip Kumar Kushwaha |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Prototype of Border Surveillance System |
Abstract
PDF
|
Sandeep Panwar Jogi |
|
Vol 3, No 12 (2016): Vol-3_Issue-12_August_2016 |
Provable Data Integrity in Multi Cloud using IB Encryption |
Abstract
PDF
|
M. AMARESWARA KUMAR, ANITHA REDDY YAPARLA |
|
Vol 3, No 12 (2016): Vol-3_Issue-12_August_2016 |
Provable Dynamic Data in Cloud Computing Systems |
Abstract
PDF
|
P. Rajashekar, S. Suresh |
|
Vol 3, No 14 (2016): Vol-3_Issue-14_October_2016 |
Provable Dynamic Data in Cloud Computing Systems |
Abstract
PDF
|
SHAIK NAGUL IMRAN, M. Omprakash |
|
Vol 4, No 01 (2017): Vol-04_Issue-01_January_2017 |
Provable multi copy Dynamic data possession in security analysis on one-to-many order preserving Encryption based cloud data searchs |
Abstract
PDF
|
Naganaboina Sandeep, P. Ashok Kumar |
|
Vol 3, No 14 (2016): Vol-3_Issue-14_October_2016 |
Provable Multicopy Data Possession in Cloud Computing System Applications |
Abstract
PDF
|
Kumari Jelli, J. Rajashekar, S. Adilakshmi |
|
Vol 3, No 18 (2016): Vol-3_Issue-18_December_2016 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
Abstract
PDF
|
V. SOMASEKHAR, S. G NAWAZ, R. RAMACHANDRA |
|
Vol 4, No 3 (2017): Vol-04_Issue-03_MARCH_2017 |
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems |
Abstract
PDF
|
SOMASEKHAR V, S G NAWAZ, R RAMA CHANDRA |
|
Vol 5, No 15 (2018): Vol-05-Issue-15-May-2018 |
Provably Lightweight Rfid Mutual Authentication Protocol |
Abstract
PDF
|
N. Swetha |
|
Vol 6, No 4 (2019): Vol-6-Issue-04-April-2019 |
Provenance and sedimentological studies of shallow offshore sediment, offshore depobelt, niger delta |
Abstract
|
Mr. IKPORUKPO, Mr. OKENGWU |
|
Vol 6, No 10 (2019): Vol-6-Issue-10-September-2019 |
Proverbs As Reflection Of National Character (In The Context Uzbek And English Proverbs) |
Abstract
PDF
|
Narmuratov Zayniddin Radjabovich |
|
Vol 3, No 9 (2016): Vol-3_Issue-9_May_2016 |
Providing Authorized Access Control on Encrypted Data and Indirect Trust for Cloud Storage Systems |
Abstract
PDF
|
P. S. Abhilash, P. Namrata |
|
11826 - 11850 of 15699 Items |
<< < 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 > >> |