S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJATIR 673 | A Hybrid Cloud Approach to Protect Data Confidentiality and Data Security Authors:M. NARAYANA, G. VISWANATH |
4255-4257 |
Download | |
IJATIR 674 | Efficacious Routing for Diminish Delay with Efficient Integrity Authors:S.RAMA KRISHNA, B.PADMAJA RANI, SONGA MANI KUMAR |
4258-4260 |
Download | |
IJATIR 675 | Invulnerable Cyberspace Services with Conterminous User Singularity Authors:VANDAVASI LAKSHMI SINDHURI, M.GANESH BABU, P.NAGA DEEPTHI, DONAVALLI VENKATA VIDYA DEEPTHI |
4261-4263 |
Download | |
IJATIR 676 | Disunity of Tweets Arrangement for Prominent Utility Online Social Networks Authors:ANDE SIRISHA, GORANTLA SARATH BABU |
4264-4267 |
Download | |
IJATIR 677 | Confidential Safeguard Multi Keyword Access Control in Shared Clouds Authors:SRIKAKOLAM.ANUSHA, G. SATYANARAYANA, M.GANESH BABU, HOMER BENNY BANDELA |
4268-4272 |
Download | |
IJATIR 678 | Content Based Publish Subscriber System using Encryption Technique Authors:K. USHA VARA SOWMYA, DR. M. SAMPATH KUMAR |
4273-4279 |
Download | |
IJATIR 679 | Secure Auditing and Deduplicating Data in Cloud Authors:ALLU DIVYA, CH.K.RUPESH KUMAR |
4280-4284 |
Download | |
IJATIR 680 | An Efficient Design and Implementation of High Throughput and Area Efficient Hard Decision Viterbi Decoder in 65nm Technology Authors:DAYAKAR REDDY, K.GOWTHAMI |
4285-4289 |
Download | |
IJATIR 681 | Wheel Chair Control using Android Phone Operated Voice Gesture and Touch Authors:M. MALATHI, K. JEEVAN REDDY |
4290-4292 |
Download | |
IJATIR 682 | Clustering of Email Documents to Understand Classifiers Attack Authors:N A F NAMRATHA, DR. M SAMPATH KUMAR |
4293-4297 |
Download | |
Submission Open for 2021 |
Last Date of Submission : |
20th, October-2021 |
Acceptance Notification : |
After Peer Review |
Last Date of Publication : |
30th, October-2021 |