|
Issue |
Title |
|
Vol 6, No 8 (2019): Vol-6-Issue-08-July-2019 |
Secure Sharing Of PHR Data Using Reencryption |
Abstract
PDF
|
CHINDRIPU. JEMERIS CHERIAN, S. CHITTIBABULU |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
Secure SMS Encryption using AES algorithm and Caesar cipher |
Abstract
PDF
|
Jyothi Pawar |
|
Vol 5, No 22 (2018): Vol-5-Issue-22-November-2018 |
Secure Spatial Query Processing Using Hilbert Packet List on Cloud Data |
Abstract
PDF
|
BH. N. Ravalli, K. Ganesh Reddy |
|
Vol 4, No 13 (2017): Vol-04-Issue-13-October-2017 |
Secure Storage in Cloud |
Abstract
PDF
|
ERUKULLA SRILEKHA, K. SHEKHAR |
|
Vol 4, No 10 (2017): Vol-04_Issue-10_September_2017 |
Secure User Generated Content Sharing with Security and Data Processing in Big Data Application |
Abstract
PDF
|
T. Satya kiranmai, Swetha Koduri |
|
Vol 3, No 4 (2016): Vol-3_Issue-4_February_2016 |
Secure Web Data Analysis in Vertical Partitioned Database |
Abstract
PDF
|
Priyanka Pandey, Javed Akhtar Khan |
|
Vol 3, No 4 (2016): Vol-3_Issue-4_February_2016 |
Secure Web Data Analysis in Vertical Partitioned Database |
Abstract
PDF
|
Priyanka Pandey, Javed Akhtar Khan |
|
Vol 2, No 12 (2015): VOL-2_ISSUE-12_December_2015 |
Secured Authentication for Banking Services using Visual Cryptography |
Abstract
PDF
|
G. Mohini, M. Chandra Sekhar |
|
Vol 4, No 10 (2017): Vol-04_Issue-10_September_2017 |
Secured Data Outsourcing in Cloud Computing |
Abstract
|
Megavath Srinu |
|
Vol 4, No 10 (2017): Vol-04_Issue-10_September_2017 |
Secured Data Usage with Controlled Access in Open Network |
Abstract
PDF
|
N. Naveen Kumar, Juluri Sharan Kumar |
|
Vol 5, No 6 (2018): Vol-05-Issue-06-March-2018-Special-Issue-Conference-Papers |
Secured Distributed Rdf Data In Cloud Storage |
Abstract
PDF
|
Syed Thisin |
|
Vol 5, No 01 (2018): Vol-05-Issue-01-January-2018 |
Secured Location Aware Queries with Sensible Knn Keywords |
Abstract
PDF
|
Somayajula Lakshmi Prasanna, Dasari Vinay Kumar |
|
Vol 5, No 4 (2018): Vol-05-Issue-04-February-2018 |
Secured Multimedia Content in Cloud |
Abstract
PDF
|
Yanamala Narendra, G.V. Manikanth |
|
Vol 4, No 13 (2017): Vol-04-Issue-13-October-2017 |
Secured Multimedia Management for Image Processing Applications |
Abstract
PDF
|
Jangam Deepthi |
|
Vol 4, No 5 (2017): Vol-04_Issue-05_April_2017 |
Secured Phone Mode Conversion |
Abstract
PDF
|
T. Deepthi, P. Siri sri, B. Raswitha |
|
Vol 4, No 14 (2017): Vol-04-Issue-14-November-2017 |
Secured Routing Protocol for Wireless Sensor Networks |
Abstract
PDF
|
S. Vennela, V. Sabhitha |
|
Vol 4, No 01 (2017): Vol-04_Issue-01_January_2017 |
Secured Shared Dynamic Cloud Data with Group User Revocation |
Abstract
PDF
|
Yedulla Surender Reddy, M. Ajay Kumar, Dr. Satyanarayana |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
SecureData Dividing model for Dynamic Groups in the Cloud |
Abstract
PDF
|
M. Vamsidhar, O. Devanand |
|
Vol 5, No 7 (2018): Vol-05-Issue-07-March-2018 |
Securing Cloud Storage Dual-Server Using Public-Key Encryption with Keyword Search |
Abstract
PDF
|
Veligatla Suneel Goud, Kompella Venkata Ramana |
|
Vol 4, No 3 (2017): Vol-04_Issue-03_MARCH_2017 |
Securing Data in Cloud Environments by Using RSA Algorithm |
Abstract
PDF
|
Namita Jhende, Raghvendra Kumar |
|
Vol 4, No 9 (2017): Vol-4_Issue-09_August_2017 |
Securing Data inside Images in Rdbms for Protection against |
Abstract
PDF
|
A.V. A Swarna, Dr. K. Suresh Babu |
|
Vol 5, No 12 (2018): Vol-05-Issue-12-April-2018 |
Securing data using Graphical view of Encrypted data |
Abstract
PDF
|
A. Vijetha, K.Mounika Ram, DV. Sravya, U.Narsa Reddy |
|
Vol 3, No 3 (2016): International Conference on Research and Recent Trends in Engineering and Technology. (ICRRTET) 2016 |
Securing Domain Name System Using Advanced Encryption Standard |
Abstract
PDF
|
Priya S. Trivedi, Rupal R. Tamboli, P. M. Gourshettiwar |
|
Vol 3, No 10 (2016): Vol-3_Issue-10_June_2016 |
Securing group based System and Providing key privacy in Multimedia Key Agreement System |
Abstract
PDF
|
Shafiqua C. Pathan, Dhananjay M. Sable |
|
Vol 3, No 6 (2016): National Conference on Recent Engineering Trends |
Securing PIN Entry through User’s Own Touchscreen Devices to Prevent Shoulder Surfing Attacks |
Abstract
PDF
|
Jyoti Chikane, Gaikwad Priyanka, Kishor funde, Ritesh Thakur |
|
12876 - 12900 of 15699 Items |
<< < 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 > >> |