Issue | Title | |
Vol 12, No 1 (2024): May - June | Secure Image Generation Using GANs and VAEs: Integrating Robust Security Measures against Adversarial Threats | Abstract PDF [Full Text] |
Gunda Satish Kumar | ||
Vol 4, No 7 (2016): July | Secure Key Distribution and Data sharing for Dynamic groups in Cloud to protect from Collusion Attack | Abstract PDF [Full Text] |
B Mary Suhani, V Srinadh | ||
Vol 7, No 7 (2019): July | Secure Sharing of PHR Data Using Re-Encryption: SESPHR | Abstract PDF [Full Text] |
V K Monika, V Praveen Kumar Bejagam | ||
Vol 2, No 2 (2014): February | Secured and Smart Electronic voting system | Abstract PDF [FULL TEXT] |
B.Ravi Kumar, T.V Janardhana Rao, Dr.N.S. Murthy Sharma, P. Harika | ||
Vol 6, No 9 (2018): September | Secured Data Encryption Evaluation on Transmission Network using Fuzzy Logic | Abstract PDF [Full Text] |
Sk Baji, S Ravi Kumar | ||
Vol 3, No 11 (2015): November | Secured Data Retrieval System in Unfriendly Regions Using CP-ABE Based in Ad Hoc Disruption- Tolerant Networks | Abstract PDF [FULL TEXT] |
K Yamini, V Jhansi Lakshmi | ||
Vol 6, No 5 (2018): May | Secured Framework for Data Outsourcing using ABE in Cloud Computing | Abstract PDF [Full Text] |
V Sri Ramya, A.P.V.D.L A.P.V.D.L. Kumar | ||
Vol 8, No 7 (2020): July | Secured Personal Data Storage of Users to Protect from External Applications | Abstract PDF [Full Text] |
Y T S Srirama lakshmi, R. Anusha | ||
Vol 2, No 11 (2014): November | Securing Manets By Using An Intrusion Detection System (Eaack) | Abstract PDF[FULL TEXT] |
M Vamsi Krishna, D Jaya Prakash | ||
Vol 2, No 11 (2014): November | Security Analysis And Perform Extensive Simulations To Demonstrate The Efficiency Of Mona For Data Sharing In The Cloud | Abstract PDF[FULL TEXT] |
M Vamsi Krishna, K V.V.S.Narayana Murthy, T Satya swaroop | ||
Vol 2, No 10 (2014): October | Seismic Analysis And Design of Cantilever Retaining Walls | Abstract PDF [Full Text] |
Shoeb Mohammed Sayeed, Sunandan Reddy, K . Mythili | ||
Vol 4, No 12 (2016): December | Self adaptive controlling mechanism to optimize the efficiency of network implementing Routing –as-a-Service | Abstract PDF [Full Text] |
J. Chandrakanta Badajena, Chinmayee Rout, Shatabdinalini ., Anandita Mohapatra | ||
Vol 3, No 10 (2015): October | Self-assured Collective Data Transferring in Vehicular Ad Hoc Networks | Abstract PDF [Full Text] |
J Bala Ambedkar, D Srinivas | ||
Vol 3, No 10 (2015): October | Self-Assured Formal Deduplication In FusionCloud Methodology | Abstract PDF[FULL TEXT] |
P Lakshmi Tejaswi, N Srinu | ||
Vol 9, No 1 (2021): January | Sensitivity Improvement of Hartnell Governor | Abstract PDF [Full Text] |
Makam Kranthi Bhanu Raja | ||
Vol 2, No 1 (2014): January | Sensorless Speed Control Scheme for Induction Motor Drive Using DC link Measurements | Abstract PDF [FULL TEXT] |
Yesupadam C, Sk Gouse Basha, Ravi Kumar Reddy P | ||
Vol 4, No 2 (2016): February | Sesimic Evaluation Of Multistoried Building With Ground Soft Story And With Infills By Using Etabs | Abstract PDF [FULL TEXT] |
K Sugamya, K Jaya Prakash | ||
Vol 5, No 6 (2017): June | Seven Level Hybrid Neutral Point Flying Capacitor Multilevel Inverter | Abstract PDF [Full Text] |
D Parvathi Devi, K Anil Kumar | ||
Vol 3, No 6 (2015): June | Shared Data Integrity Using Public Auditing Mechanism | Abstract PDF [Full Text] |
Supriya Menon, Sameena Masrath, I.Narsimha Rao | ||
Vol 8, No 12 (2020): December | Sharing Private Data with Group of Users via Cloud in a Secure Way | Abstract PDF [Full Text] |
V Naga Venkata Ramana, P Rama Krishna | ||
Vol 3, No 8 (2015): August | She–PWM Cascaded Seven level Inverter With Adjustable DC Voltage Levels Control For D-Statcom Applications | Abstract PDF [Full Text] |
Rani Hepsiba, P. V. Prasuna | ||
Vol 2, No 9 (2014): September | Sheltered Compound Vendor Data Apportioning For Vibrant Clusters In The Cloud | Abstract PDF [Full Text] |
A Madhusudhana Rao, O Srinivas | ||
Vol 3, No 7 (2015): July | Signature Searching Concerning Association Assortment of Files | Abstract PDF[FULL TEXT] |
Srinadh Reddy N, Vanaja S | ||
Vol 3, No 12 (2015): December | Significant Cumulative Cryptosystem for Accessible Data Distribution in Cloud Storage | Abstract PDF [FULL TEXT] |
S Jhansi, Ch Sekhar | ||
Vol 9, No 2 (2021): February | Similarity Search towards Encrypted Images for Content - Based Image Retrieval in Cloud Computing | Abstract PDF [Full Text] |
Kiran Bharadwaj Vedula, P. Rama Krishna | ||
926 - 950 of 1079 Items | << < 33 34 35 36 37 38 39 40 41 42 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â