Submission Open for 2024 |
Last Date of Submission : |
20th, March-2024 |
Acceptance Notification : |
After the Peer Review |
Last Date of Publication : |
30th, March-2024 |
Volume13 ISSUE 1 Call for Conference Special Issue Archive (Recent Update ISSUE)
S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJSETR 79 | Cloud Computing Authentication Techniques: A Survey Authors:DR. V. V. S. S. S. BALARAM |
0458-0464 |
Download | |
IJSETR 80 | Authenticating by using Secure Auditing and Deduplicating Data in Cloud Authors:A. DILIP KUMAR REDDY, DEVI PRASAD MISHRA, DR. S. SENTHIL KUMAR, DR. S. SREENATHA REDDY, DR. M. NARENDRA KUMAR |
0465-0473 |
Download | |
IJSETR 81 | Key Management Framework by using a Cloud Key for Owner and Privacy Authorisation Authors:THUMMA LAVANYA, G. CH. SRINIVASA RAO |
0474-0482 |
Download | |
IJSETR 82 | A Secure Scheme for Public Auditing and Retrieving Users Cloud Data by Improvising Multiple Ranking Scheme Authors:RAJA HARSHBARDHAN ROY, GANJI RAMANJAIAH |
0483-0486 |
Download | |
IJSETR 83 | Detecting Attacks in Wireless Sensor Network through Bloom Filtering Authors:CHIRALA RAMA, SK. MASTHANVALI |
0487-0490 |
Download | |
IJSETR 84 | Auditing Cloud Information using Control Attribute Based Encryption System Authors:VADLAMUDI PADMAJA, PANTHAGANI VIJAYABABU |
0491-0493 |
Download | |
IJSETR 85 | Design and Analysis of High Performance and Slew Rate Miller Class AB Operational Amplifier Authors:EDULA DIVYASIRI, A. RANGANAYAKULU |
0494-0497 |
Download | |
IJSETR 86 | Key Generation Technique with Contributory Broadcast Encryption Using Anonymous Authentication Authors:BEJAWADA BHARGAVI, ALAHARI HANUMAT PRASAD |
0498-0502 |
Download | |
IJSETR 87 | Securing Cloud Services by Reputation Based Trust Management Authors:K. ARUN KUAR, K. NOWSHAD |
0503-0506 |
Download | |
IJSETR 88 | Secured Collection Data Allotment over Cloud by using key Aggregate and Searchable Techniques Authors:VADLAMANU KISHORE BABU, KIRAN KUMAR KAVETI |
0507-0511 |
Download | |