Title of paperName of the author/sName of journalISSN numberLink to the recognition in UGC enlistment of the Journal
Evolution to Big Data Analytics and Techniques and challenging issues in Data Mining with Big Data.GIDLA VIJAYA KUMARI, INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND RESEARCH2320-5547http://www.ijitr.com/index.php/ojs/article/view/2545/pdf
Title of paperName of the author/sName of journalISSN numberLink to the recognition in UGC enlistment of the Journal
Design of Machine Learning Based suicide Rate Prediction SystemDr.AKILARANI MInternational Journal of Scientific Research and Review2279-0543http://www.dynamicpublisher.org/gallery/62-ijsrr-d-1769.f.pdf
Design of Machine Learning Based suicide Rate Prediction SystemB V RAM KUMARInternational Journal of Scientific Research and Review2279-0543http://www.dynamicpublisher.org/gallery/62-ijsrr-d-1769.f.pdf
Client SteadFastness Care ful Perfect Multi-Server PlanAKELLA SUBHADRAINTERNATIONAL JOURNAL OF RESEARCH2348-6848https://journals.pen2print.org/index.php/ijr/article/view/16620
ENHANCING THE TELUGU TEXT FEATURE BASED ON AUTHORSHIP ATTRIBUTION USING MACHINE LEARNING TECHNIQUESDr.MADDULA PRASADINTERNATIONAL JOURNAL OF RESEARCH2236-6124 DOI:16.10089.IJR.2018.V7I10.285311.003450
ENHANCING THE TELUGU TEXT FEATURE BASED ON AUTHORSHIP ATTRIBUTION USING MACHINE LEARNING TECHNIQUESM VENKATA RAJENDRAINTERNATIONAL JOURNAL OF RESEARCH2236-6124 DOI:16.10089.IJR.2018.V7I10.285311.003450
ENHANCING THE TELUGU TEXT FEATURE BASED ON AUTHORSHIP ATTRIBUTION USING MACHINE LEARNING TECHNIQUESCHEVVAKULA SUMAINTERNATIONAL JOURNAL OF RESEARCH2236-6124 DOI:16.10089.IJR.2018.V7I10.285311.003450
ANALYTICAL STUDY ON SPATIAL DATA MINING TECHNIQUESYALLA NAGA SATISHJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131        DOI:16.10089.JASC.2018.V5I8.453459.0500206
ANALYTICAL STUDY ON SPATIAL DATA MINING TECHNIQUEST SRI RAMA LAKSHMIJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131        DOI:16.10089.JASC.2018.V5I8.453459.0500206
ANALYTICAL STUDY ON SPATIAL DATA MINING TECHNIQUESBOkkA DURGA PRASADJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131        DOI:16.10089.JASC.2018.V5I8.453459.0500206
Energy Consumption Prediction using Decision Tree Regression model in machine LearningGIDLA VIJAYA KUMARIInternational Journal of Scientific Research and Review2279-0543http://www.ijsrr.org/pdf/82375.pdf
A Machine Learning approach for annual rainfall prediction using Linear Regression ModelN SUSHUMAInternational Journal of Scientific Research and Review2279-0543http://www.ijsrr.org/pdf/82381.pdf
A Machine Learning approach for annual rainfall prediction using Linear Regression ModelK L GANAPATHI REDDYInternational Journal of Scientific Research and Review2279-0543http://www.ijsrr.org/pdf/82381.pdf
A Machine Learning approach for annual rainfall prediction using Linear Regression ModelVINTI H L MANIKYAMBHAInternational Journal of Scientific Research and Review2279-0543http://www.ijsrr.org/pdf/82381.pdf
Vitality proficient clustering algorithm in wireless sensor networkPOPPOPPULA T S N MURTYINTERNATIONAL JOURNAL OF RESEARCH2235-767Xhttps://edupediapublications.org/journals
Vitality proficient clustering algorithm in wireless sensor networkCHINNAM RANJITH KUMARINTERNATIONAL JOURNAL OF RESEARCH2235-767Xhttps://edupediapublications.org/journals
Energy Consumption Prediction using Decision Tree Regression model in machine LearningGANJI LAXMIInternational Journal of Scientific Research and Review2279-0543http://www.ijsrr.org/pdf/82375.pdf
A secured Multi keyword Ranked Search Scheme for Encrypted Data in Cloud StoragePUTI SOWMYAINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455  DOI:16.10089.IJMTE.2018.V8I12.17.2727
A secured Multi keyword Ranked Search Scheme for Encrypted Data in Cloud StorageMOTURI SURYA KIRANINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455  DOI:16.10089.IJMTE.2018.V8I12.17.2727
A secured Multi keyword Ranked Search Scheme for Encrypted Data in Cloud StorageSAPPA SURESHINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455  DOI:16.10089.IJMTE.2018.V8I12.17.2727
Anonymous Authentication of Cloud Data with Decentralized AccessCHILLA SANTHIUNIVERSAL REVIEW2277-2723 DOI:16.10089.UR.2019.V8I2.18.24188
Anonymous Authentication of Cloud Data with Decentralized AccessADABALA P V D L KUMARUNIVERSAL REVIEW2277-2723 DOI:16.10089.UR.2019.V8I2.18.24188
Anonymous Authentication of Cloud Data with Decentralized AccessTATAPUDI SIVARAMAKRISHNAUNIVERSAL REVIEW2277-2723 DOI:16.10089.UR.2019.V8I2.18.24188
 
Title of paperName of the author/sName of journalISSN numberLink to the recognition in UGC enlistment of the Journal
MULTI-CLOUD CONFINED CATALOG FOR MATHEMATICAL ALLIED DIVERSITY QUERYB V RAM KUMARINTERNATIONAL JOURNAL OF RESEARCH2348-6848https://journals.pen2print.org/index.php/ijr/article/view/15181/14665
MULTI-CLOUD CONFINED CATALOG FOR MATHEMATICAL ALLIED DIVERSITY QUERYVINTI H L MANIKYAMBHAINTERNATIONAL JOURNAL OF RESEARCH2348-6848https://journals.pen2print.org/index.php/ijr/article/view/15181/14665
Aviator Sustain Scheme: A Machine Learning AccessK L GANAPATHI REDDYINTERNATIONAL JOURNAL OF RESEARCH2348-6848https://journals.pen2print.org/index.php/ijr/article/view/15338
Aviator Sustain Scheme: A Machine Learning AccessCHINNAM RANJITH KUMARINTERNATIONAL JOURNAL OF RESEARCH2348-6848https://journals.pen2print.org/index.php/ijr/article/view/15338
Aviator Sustain Scheme: A Machine Learning AccessPOPPOPPULA T S N MURTYINTERNATIONAL JOURNAL OF RESEARCH2348-6848https://journals.pen2print.org/index.php/ijr/article/view/15338
Game Champion Prediction Using Machine LearningCHINNAM RANJITH KUMARINTERNATIONAL JOURNAL OF RESEARCH AND ANALYTICAL REVIEWS 2349-5138http://www.ijrar.org/viewfull.php?&p_id=IJRAR19J3746
SHARING OF SCALABLE DATA IN CLOUD STORAGE USING KEY-AGGREGATE CRYPTOSYSTEMM JANAKI RAMUDUINTERNATIONAL JOURNAL OF RESEARCH2236-6124  DOI:16.10089.IJR.2018.V7I1.285311.2622
SHARING OF SCALABLE DATA IN CLOUD STORAGE USING KEY-AGGREGATE CRYPTOSYSTEMYALLA NAGA SATISHINTERNATIONAL JOURNAL OF RESEARCH2236-6124  DOI:16.10089.IJR.2018.V7I1.285311.2622
SHARING OF SCALABLE DATA IN CLOUD STORAGE USING KEY-AGGREGATE CRYPTOSYSTEMMOTURI SURYA KIRANINTERNATIONAL JOURNAL OF RESEARCH2236-6124  DOI:16.10089.IJR.2018.V7I1.285311.2622
Utilizations of Contraption Erudition to Resource Supervision in Gloom GaugeCHINNAM RANJITH KUMARINTERNATIONAL JOURNAL OF RESEARCH2348-6848https://journals.pen2print.org/index.php/ijr/article/view/15373
Utilizations of Contraption Erudition to Resource Supervision in Gloom GaugeK L GANAPATHI REDDYINTERNATIONAL JOURNAL OF RESEARCH2348-6849https://journals.pen2print.org/index.php/ijr/article/view/15373
Utilizations of Contraption Erudition to Resource Supervision in Gloom GaugePOPPOPPULA T S N MURTYINTERNATIONAL JOURNAL OF RESEARCH2348-6850https://journals.pen2print.org/index.php/ijr/article/view/15373
Scalable and Efficient Key Management Protocol in Defending Against Various Attacks in Wireless Sensor NetworksT SRI RAMA LAKSHMIINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455 http://ijamtes.org/VOL-7-ISSUE-9-2017/
Scalable and Efficient Key Management Protocol in Defending Against Various Attacks in Wireless Sensor NetworksAKELLA SUBHADRAINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455 http://ijamtes.org/VOL-7-ISSUE-9-2017/
Scalable and Efficient Key Management Protocol in Defending Against Various Attacks in Wireless Sensor NetworksM VENKATA RAJENDRAINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455 http://ijamtes.org/VOL-7-ISSUE-9-2017/
An Algorithm to Discover Disconnection and Reconnecting Wireless sensor system partitionsGIDLA VIJAYA KUMARIUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-6-ISSUE-11-2017/
An Algorithm to Discover Disconnection and Reconnecting Wireless sensor system partitionsCHILLA SANTHIUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-6-ISSUE-11-2017/
An Algorithm to Discover Disconnection and Reconnecting Wireless sensor system partitionsN SUSHUMAUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-6-ISSUE-11-2017/
 A ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORKADABALA P V D L KUMARJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131DOI:16.10089.JASC.2018.V5I4.453459.04935
 A ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORKTATAPUDI SIVARAMAKRISHNAJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131DOI:16.10089.JASC.2018.V5I4.453459.04935
 A ROUTING FRAMEWORK FOR VIDEO TRAFFIC IN WIRELESS MULTIHOP NETWORKSAPPA SURESHJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131DOI:16.10089.JASC.2018.V5I4.453459.04935
Performance of reactive and proactive MANET routing protocols with trajectoriesDr.MADDULA PRASADIJTRDISSN:2394-9333http://www.ijtrd.com/papers/IJTRD14782.pdf
DEVELOPMENT OF DATA STORAGE AND ACCESS CONTROL SCHEME USING MULTI AUTHORITY FRAMEWORKDr.MADDULA PRASADINTERNATIONAL JOURNAL OF RESEARCH2236-6124DOI:16.10089.IJR.2017.V6I7.236456.00847
DEVELOPMENT OF DATA STORAGE AND ACCESS CONTROL SCHEME USING MULTI AUTHORITY FRAMEWORKMAHANTHI SRIRAMULUINTERNATIONAL JOURNAL OF RESEARCH2236-6124DOI:16.10089.IJR.2017.V6I7.236456.00847
DEVELOPMENT OF DATA STORAGE AND ACCESS CONTROL SCHEME USING MULTI AUTHORITY FRAMEWORKPUTI SOWMYAINTERNATIONAL JOURNAL OF RESEARCH2236-6124DOI:16.10089.IJR.2017.V6I7.236456.00847
Title of paperName of the author/sName of journalISSN numberLink to the recognition in UGC enlistment of the Journal
Masquerade Attacks Detection using Data Driven ApproachGIDLA VIJAYA KUMARIINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-6-ISSUE-2-2016/
Masquerade Attacks Detection using Data Driven ApproachVINTI H L MANIKYAMBHAINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-6-ISSUE-2-2016/
Masquerade Attacks Detection using Data Driven ApproachSAPPA SURESHINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-6-ISSUE-2-2016/
DEVELOPMENT OF FRAUD APPS USING FRAPPEFOR FACEBOOK IN MOBILE APPSADABALA P V D L KUMARUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-6-ISSUE-1-2017/
DEVELOPMENT OF FRAUD APPS USING FRAPPEFOR FACEBOOK IN MOBILE APPSTATAPUDI SIVARAMAKRISHNAUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-6-ISSUE-1-2017/
DEVELOPMENT OF FRAUD APPS USING FRAPPEFOR FACEBOOK IN MOBILE APPSK L GANAPATHI REDDYUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-6-ISSUE-1-2017/
USING THIRD PARTY AUDITOR UNRESTRICTED AUDITING OF PRIVACY-PRESERVING FOR PROTECTED CLOUD STORAGEAKELLA SUBHADRAINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-6-ISSUE-2-2016/
USING THIRD PARTY AUDITOR UNRESTRICTED AUDITING OF PRIVACY-PRESERVING FOR PROTECTED CLOUD STORAGEMOTURI SURYA KIRANINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-6-ISSUE-2-2016/
USING THIRD PARTY AUDITOR UNRESTRICTED AUDITING OF PRIVACY-PRESERVING FOR PROTECTED CLOUD STORAGEYALLA NAGA SATISHINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-6-ISSUE-2-2016/
Filtered Techniques of redundant Messages from Social network UsersB V RAM KUMARJournal of Applied Science and Computations1076-5131http://j-asc.com/Volume-3-Issue-2-June-December-2016/
Filtered Techniques of redundant Messages from Social network UsersN SUSHUMAJournal of Applied Science and Computations1076-5131http://j-asc.com/Volume-3-Issue-2-June-December-2016/
Filtered Techniques of redundant Messages from Social network UsersCHILLA SANTHIJournal of Applied Science and Computations1076-5131http://j-asc.com/Volume-3-Issue-2-June-December-2016/
DEPENDABLE DE-DUPLICATION IN HYBRID CLOUD CRAFTM VENKATA RAJENDRAInternational Journal of Research2236-6124  DOI:16.10089.IJR.2017.V6I3.236456.000646
DEPENDABLE DE-DUPLICATION IN HYBRID CLOUD CRAFTT SRI RAMA LAKSHMIInternational Journal of Research2236-6124  DOI:16.10089.IJR.2017.V6I3.236456.000646
DEPENDABLE DE-DUPLICATION IN HYBRID CLOUD CRAFTCHEVVAKULA SUMAInternational Journal of Research2236-6124  DOI:16.10089.IJR.2017.V6I3.236456.000646
Title of paperName of the author/sName of journalISSN numberLink to the recognition in UGC enlistment of the Journal
AN ABSTRACT COMPUTING DEVICE & RECENT TRENDS IN AUTOMATIONAKELLA SUBHADRAUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-4-ISSUE-2-2015/
AN ABSTRACT COMPUTING DEVICE & RECENT TRENDS IN AUTOMATIONGIDLA VIJAYA KUMARIUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-4-ISSUE-2-2015/
AN ABSTRACT COMPUTING DEVICE & RECENT TRENDS IN AUTOMATIONVINTI H L MANIKYAMBHAUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-4-ISSUE-2-2015/
DEIGN OF HYBRID CLOUD BASED ON SHELTERED AUTHORIZED DEDUPLICATIONADABALA P V D L KUMARJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131http://j-asc.com/Volume-2-Issue-2-June-December-2015/
DEIGN OF HYBRID CLOUD BASED ON SHELTERED AUTHORIZED DEDUPLICATIONMOTURI SURYA KIRANJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131http://j-asc.com/Volume-2-Issue-2-June-December-2015/
DEIGN OF HYBRID CLOUD BASED ON SHELTERED AUTHORIZED DEDUPLICATIONM JANAKI RAMUDUJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131http://j-asc.com/Volume-2-Issue-2-June-December-2015/
DESIGN OF KEY MANAGEMENT SYSTEM FOR WSN’s TO AVOID VARIOUS ATTACKSB V RAM KUMARINTERNATIONAL JOURNAL OF RESEARCH2236-6124http://j-asc.com/Volume-2-Issue-2-June-December-2015/
DESIGN OF KEY MANAGEMENT SYSTEM FOR WSN’s TO AVOID VARIOUS ATTACKSCHILLA SANTHIINTERNATIONAL JOURNAL OF RESEARCH2236-6124http://j-asc.com/Volume-2-Issue-2-June-December-2015/
DESIGN OF KEY MANAGEMENT SYSTEM FOR WSN’s TO AVOID VARIOUS ATTACKSSAPPA SURESHINTERNATIONAL JOURNAL OF RESEARCH2236-6124http://j-asc.com/Volume-2-Issue-2-June-December-2015/
SECRECT AUTHENTICATION ACCESS CONTROL SCHEME TO PROTECT DATA STORAGE IN CLOUDN SUSHUMAUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-5-ISSUE-1-2016/
SECRECT AUTHENTICATION ACCESS CONTROL SCHEME TO PROTECT DATA STORAGE IN CLOUDK L GANAPATHI REDDYUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-5-ISSUE-1-2016/
SECRECT AUTHENTICATION ACCESS CONTROL SCHEME TO PROTECT DATA STORAGE IN CLOUDTATAPUDI SIVARAMAKRISHNAUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-5-ISSUE-1-2016/
EXPLORATION OF MULTI-KEY ORDER FOR RELIABLE AND PROGRESSIVE BLUEPRINT ON CIPHER TEXT IN THE CLOUDM JANAKI RAMUDUUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-5-ISSUE-1-2016/
EXPLORATION OF MULTI-KEY ORDER FOR RELIABLE AND PROGRESSIVE BLUEPRINT ON CIPHER TEXT IN THE CLOUDDr.MADDULA PRASADUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-5-ISSUE-1-2016/
EXPLORATION OF MULTI-KEY ORDER FOR RELIABLE AND PROGRESSIVE BLUEPRINT ON CIPHER TEXT IN THE CLOUDMAHANTHI SRIRAMULUUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-5-ISSUE-1-2016/
ANALYSIS, DESIGN & APPLICATIONS OF GREEDY ALGORITHMS

T SRI RAMA LAKSHMIINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-6-ISSUE-1-2016/
ANALYSIS, DESIGN & APPLICATIONS OF GREEDY ALGORITHMS

YALLA NAGA SATISHINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455 http://ijamtes.org/VOL-6-ISSUE-1-2016/
ANALYSIS, DESIGN & APPLICATIONS OF GREEDY ALGORITHMS

PUTI SOWMYAINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455 http://ijamtes.org/VOL-6-ISSUE-1-2016/
Title of paperName of the author/sName of journalISSN numberLink to the recognition in UGC enlistment of the Journal
IMPLEMENTATION OF CLUSTERING ALGORITHM FOR UNIQUE VALUE DISINTEGRATION TO PROBING RESULTSB V RAM KUMARINTERNATIONAL JOURNAL OF RESEARCH2236-6124http://ijrpublisher.com/VOL-3-ISSUE-1-2014/
IMPLEMENTATION OF CLUSTERING ALGORITHM FOR UNIQUE VALUE DISINTEGRATION TO PROBING RESULTSN SUSHUMAINTERNATIONAL JOURNAL OF RESEARCH2236-6124http://ijrpublisher.com/VOL-3-ISSUE-1-2014/
IMPLEMENTATION OF CLUSTERING ALGORITHM FOR UNIQUE VALUE DISINTEGRATION TO PROBING RESULTSK L GANAPATHI REDDYINTERNATIONAL JOURNAL OF RESEARCH2236-6124http://ijrpublisher.com/VOL-3-ISSUE-1-2014/
ENERGY EFFICIENT AND COST REDUCTION VIRTUAL SERVERS ALLOCATED DYNAMICALLY WITH SUPPORT OF DPSADABALA P V D L KUMARINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-4-ISSUE-2-2014/
ENERGY EFFICIENT AND COST REDUCTION VIRTUAL SERVERS ALLOCATED DYNAMICALLY WITH SUPPORT OF DPSCHILLA SANTHIINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-4-ISSUE-2-2014/
ENERGY EFFICIENT AND COST REDUCTION VIRTUAL SERVERS ALLOCATED DYNAMICALLY WITH SUPPORT OF DPSTATAPUDI SIVARAMAKRISHNAINTERNATIONAL JOURNAL OF ADVANCED IN MANAGEMENT, TECHNOLOGY AND ENGINEERING SCIENCES2249-7455http://ijamtes.org/VOL-4-ISSUE-2-2014/
Multi-Owner Data Sharing by using Three-dimensional security pattern in cloud computingGIDLA VIJAYA KUMARIUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-4-ISSUE-1-2015/
Multi-Owner Data Sharing by using Three-dimensional security pattern in cloud computingT SRI RAMA LAKSHMIUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-4-ISSUE-1-2015/
Multi-Owner Data Sharing by using Three-dimensional security pattern in cloud computingSAPPA SURESHUNIVERSAL REVIEW2277-2723http://universalreview.org/VOL-4-ISSUE-1-2015/
Decentralized Access Control Data Stored in Cloud Using Key Attribute Based Schema

Dr.MADDULA PRASADJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131http://j-asc.com/Volume-2-Issue-1-January-June-2015/
Decentralized Access Control Data Stored in Cloud Using Key Attribute Based Schema

AKELLA SUBHADRAJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131http://j-asc.com/Volume-2-Issue-1-January-June-2015/
Decentralized Access Control Data Stored in Cloud Using Key Attribute Based Schema

M VENKATA RAJENDRAJOURNAL OF APPLIED SCIENCE AND COMPUTATIONS1076-5131http://j-asc.com/Volume-2-Issue-1-January-June-2015/
Close Menu
error: Content is protected !!