S.No | Title | Page No | Download |
IJIT 35 | Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Authors:P. LAKSHMI KANTHA REDDY, SHAIK MOHD ILIAS |
0198-0203 |
Download |
IJIT 36 | A Novel Watermark Detection Based Privacy Preserving Storage Framework Authors:G. JOHN BABU, PASUPULETI SANDEEP, GUNDLA PADMA |
0204-0210 |
Download |
IJIT 37 | Implementation of Scalable Data Sharing in Cloud Storage Based Key-Aggregate Cryptosystem Authors:V. SIVA PRASAD, K MAHESH BABU |
0211-0215 |
Download |
IJIT 38 | Sharing of Distributed Accountability for Data in the Cloud Authors:IHAB RAZZAQ SEKHI, T. RAMDAS NAIK |
0216-0220 |
Download |
IJIT 39 | Consistency as a Service: Two-Level Auditing Architecture Auditing Cloud Consistency Authors:VAJJALA SIVA YADAV , K MAHESH BABU |
0221-0228 |
Download |
IJIT 40 | Implementation of Data Encryption by using Blowfish Encryption Algorithm to Protect Data in Public Cloud Authors:OMAR MOHAMMED ABDULRAHMAN ABDULKAREEM, N. SHANKER |
0229-0232 |
Download |
IJIT 41 | Improve the Efficiency of Two-Server Password-Only Authenticated Key Exchange Authors:Y. HARSHA VARDHAN, SHAIK MOHD ILIAS |
0233-0237 |
Download |
IJIT 42 | Secure & Data Integrity Proof in Cloud Storage Authors:DHURGHAM ALI MOHAMMED, S. SRAVANTHI |
0238-0240 |
Download |
IJIT 43 | Clinical Finding of Diabetes Mellitus & Non Proliferative Diabetic Retinopathy through Colour, Texture & Structure of Tongue Authors:SYEDA SUBBUHI SIDDIQUA, DR. MD ATEEQ UR RAHMAN |
0241-0247 |
Download |
IJIT 44 | Hadoop Data for Big Data Processing Authors:SHAYMAA TAHA AHMED, T. RAMDAS NAIK |
0248-0251 |
Download |
IJIT 45 | Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks Authors:B. PRANAY KUMAR, D. KRISHNA, P. RAVINDRA |
0252-0258 |
Download |
IJIT 46 | Enhancing the High Resolution Remotely Sensed Image Quality by Shadow Removal through Object Oriented Technique Authors:QADIR HUSSAIN, DR. MD. ATEEQ UR RAHMAN |
0259-0267 |
Download |
IJIT 47 | Data Integrity and Dynamic Storage Way in Cloud Computing Authors:K. BADYA NAYAK, D. KRISHNA, P. RAVINDRA |
0268-0273 |
Download |
IJIT 48 | Enhanced Multi-Keyword Ranked Search Over Encrypted Cloud Data for Security Authors:B.VENKATA JYOTHSNADEVI, G. VIJAYA VANI |
0274-0279 |
Download |