Issue | Title | |
Vol 3, No 7 (2015): July | Secrecy Sustain Broadcast Assessment for Collective Information in Cloud Computing | Abstract PDF [Full Text] |
V Ujjwala, J Haribabu, R lakshmi Tulasi | ||
Vol 2, No 11 (2014): November | Seculation Routing With Fortification Wireless Networks | Abstract PDF[FULL TEXT] |
Tikka Pallam Raju, B S N Murthy | ||
Vol 3, No 8 (2015): August | Secure Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption | Abstract PDF [Full Text] |
Vundrajavarapu Ajay Kumar, K. Satyanarayana Raju | ||
Vol 5, No 5 (2017): May | Secure Cloud Email System On Privacy Protocol And Identity-Based Encryption | Abstract PDF [Full Text] |
O. Parvathi, J.Bala Ambedkar | ||
Vol 7, No 10 (2019): October | Secure data group sharing with attribute and time based encrypted data access over cloud | Abstract PDF [Full Text] |
Badaballa Rama Lakshmi, Perabathula Chitti Talli | ||
Vol 5, No 6 (2017): June | Secure Database as a Service for Cloud Tenants With no Exposure Of Unencrypted Data | Abstract PDF [Full Text] |
Katta Uma Devi, D.Sasi Rekha | ||
Vol 3, No 10 (2015): October | Secure Deduplication Technique for Privilege Data Access Using Hybrid Cloud | Abstract PDF[FULL TEXT] |
Priyanka Vajja, Gopala Krishna J S V | ||
Vol 10, No 3 (2022): June | Secure File Allocation in Cloud Storage Using Audit Services and Deduplication | Abstract PDF [Full Text] |
Burlu Revathi, N.P. Patnayak.M | ||
Vol 7, No 3 (2019): March | Secure File Sharing With Access Grants In Cloud | Abstract PDF [Full Text] |
Shanmukh Durga Prasad, K.V.V.L Madhuri | ||
Vol 2, No 11 (2014): November | Secure Gratified Allocation with Uncontrived System in Adhoc Networks | Abstract PDF[FULL TEXT] |
Sudhakar CH, Varada Rajkumar K | ||
Vol 12, No 1 (2024): May - June | Secure Image Generation Using GANs and VAEs: Integrating Robust Security Measures against Adversarial Threats | Abstract PDF [Full Text] |
Gunda Satish Kumar | ||
Vol 4, No 7 (2016): July | Secure Key Distribution and Data sharing for Dynamic groups in Cloud to protect from Collusion Attack | Abstract PDF [Full Text] |
B Mary Suhani, V Srinadh | ||
Vol 7, No 7 (2019): July | Secure Sharing of PHR Data Using Re-Encryption: SESPHR | Abstract PDF [Full Text] |
V K Monika, V Praveen Kumar Bejagam | ||
Vol 2, No 2 (2014): February | Secured and Smart Electronic voting system | Abstract PDF [FULL TEXT] |
B.Ravi Kumar, T.V Janardhana Rao, Dr.N.S. Murthy Sharma, P. Harika | ||
Vol 6, No 9 (2018): September | Secured Data Encryption Evaluation on Transmission Network using Fuzzy Logic | Abstract PDF [Full Text] |
Sk Baji, S Ravi Kumar | ||
Vol 3, No 11 (2015): November | Secured Data Retrieval System in Unfriendly Regions Using CP-ABE Based in Ad Hoc Disruption- Tolerant Networks | Abstract PDF [FULL TEXT] |
K Yamini, V Jhansi Lakshmi | ||
Vol 6, No 5 (2018): May | Secured Framework for Data Outsourcing using ABE in Cloud Computing | Abstract PDF [Full Text] |
V Sri Ramya, A.P.V.D.L A.P.V.D.L. Kumar | ||
Vol 8, No 7 (2020): July | Secured Personal Data Storage of Users to Protect from External Applications | Abstract PDF [Full Text] |
Y T S Srirama lakshmi, R. Anusha | ||
Vol 2, No 11 (2014): November | Securing Manets By Using An Intrusion Detection System (Eaack) | Abstract PDF[FULL TEXT] |
M Vamsi Krishna, D Jaya Prakash | ||
Vol 2, No 11 (2014): November | Security Analysis And Perform Extensive Simulations To Demonstrate The Efficiency Of Mona For Data Sharing In The Cloud | Abstract PDF[FULL TEXT] |
M Vamsi Krishna, K V.V.S.Narayana Murthy, T Satya swaroop | ||
Vol 2, No 10 (2014): October | Seismic Analysis And Design of Cantilever Retaining Walls | Abstract PDF [Full Text] |
Shoeb Mohammed Sayeed, Sunandan Reddy, K . Mythili | ||
Vol 4, No 12 (2016): December | Self adaptive controlling mechanism to optimize the efficiency of network implementing Routing –as-a-Service | Abstract PDF [Full Text] |
J. Chandrakanta Badajena, Chinmayee Rout, Shatabdinalini ., Anandita Mohapatra | ||
Vol 3, No 10 (2015): October | Self-assured Collective Data Transferring in Vehicular Ad Hoc Networks | Abstract PDF [Full Text] |
J Bala Ambedkar, D Srinivas | ||
Vol 3, No 10 (2015): October | Self-Assured Formal Deduplication In FusionCloud Methodology | Abstract PDF[FULL TEXT] |
P Lakshmi Tejaswi, N Srinu | ||
Vol 13, No 2 (2025): July | SELF-HEALING CONCRETE – A SUSTAINABLE WAY IN CONSTRUCTION | Abstract PDF [Full Text] |
Chandra Mouli, Ganesh B | ||
951 - 975 of 1122 Items | << < 34 35 36 37 38 39 40 41 42 43 > >> |
Copyright © 2013, All rights reserved.| ijseat.com
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.
Â