S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJATIR 570 | Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts Authors:K. UJWALA, V. NARASIMHA, V. PRAVALIKA |
3708-3712 |
Download | |
IJATIR 571 | A Distributed Three-Hop Routing Protocol To Increase the Capacity of Hybrid Wireless Networks Authors:K. POORNA CHARY, V. NARASIMHA, V. PRAVALLIKA |
3713-3720 |
Download | |
IJATIR 572 | A Straightforward Extension Protocols Designed for Unicast Universal Network Coding to approach optimizes in Networks Authors:YERRAVARAPU V V DURGA PRASAD, LAKSHMANA RAO BATTULA |
3721-3725 |
Download | |
IJATIR 573 | Dynamic Routing Services in Wireless Sensor Networks for Processing Data Integrity and Delay Differentiated Services Authors:M. PRAVEEN KUMAR, R. NAVA TEJA REDDY, M. JEEVAN KUMAR |
3726-3728 |
Download | |
IJATIR 574 | A New Hybrid Boosting Converter for Renewable Energy Applications Authors:SHAIK RASUL PASHA, B.MALLIKA |
3729-3737 |
Download | |
IJATIR 575 | Investigation on Fast Fault Detection Capabilities of Cascaded H-Bridge Multilevel Converters in High Power Applications Authors:TATIKONDA SRILAXMI, T. CHARAN SINGH |
3738-3743 |
Download | |
IJATIR 576 | Scalable and Secure Truthful Detection of Packet Dropping Attacks in Wireless Ad-Hoc Networks Authors:DR. T. SWARNALATHA, V. MUNI RAJU NAIDU, A. VAMSI KRISHNA |
3744-3747 |
Download | |
IJATIR 577 | An Efficient Low Delay Multiplier using Carry Save Arithmetic Authors:B. BHAGYA SREE, K. BALA |
3748-3750 |
Download | |
IJATIR 578 | An Unassailable Delegation Method using Diffie-Hellman Assumption in Cloud Computing Authors:P.ANUSHA, V.V.A.S.LAKSHMI, M.SURESH |
3751-3757 |
Download | |
IJATIR 579 | Isolating My Selection: Supervision of Photo Sharing on Online Social Networks Authors:K. AYYAPPA KUMAR, T.VENKAT RAO, M.SURESH |
3758-3760 |
Download | |
Submission Open for 2021 |
Last Date of Submission : |
20th, October-2021 |
Acceptance Notification : |
After Peer Review |
Last Date of Publication : |
30th, October-2021 |