authorized users
Identifying the Authorized Users in the Network with a New Methodology
7
Secure Fuzzy Multi-Keyword Ranked Search over Encrypted Cloud Data
7
Data Confidentiality in Secure and Distributed Data Discovery and Dissemination Protocols in WSNs
6
A Smart Crypto Scheme for Multi Owner Data Authentication over Cloud Service
5
Abstract One of the catchwords in the Information Technology is Internet of Things (IoT), wherein
9
chengpengli.pdf
36
Web based controlling system for computer technology laboratory
8
An Inference Resistant Indexing Technique to Enforce Access Control in Data Outsourcing
11
A Protected Multi Authorizing Reprogramming Protocol for Wireless Sensor Networks
6
A CLOUD NETWORK-BASED POWER MANAGEMENT TECHNOLOGY FOR SMART HOME SYSTEMS
8
Vol 3, No 12 (2015)
5
Advanced Re-Encryption Technique And Verification Process In Cloud Computing
5
A Study on the Impact of Ethical Behaviour of Firms on Global Competitiveness Ranking
5
ANONYMOUS AUTHENTICATION TO CLOUD DATA STORAGE USING DECENTRALIZED ACCESS AND LOGGING SYSTEM
11
AN ALAYSIS OF MACHINE LEARNING PREDICTION ALGORITHM TO DETERMINE BEST PERFORMING ROUTES IN COGNITIVE RADIO NETWORKS
7
Secured Group Data Sharing Over Cloud by Using Aggregate Key and Searchable Encryption Techniques
5
Survey on Phrase Search Scheme over Encrypted Data on Cloud Systems
6
Performance Analysis of Different Security Based Protocols for Wireless Sensor Network
9
Attribute based Encryption and Symmetric Key Distribution for Secure Storage in Clouds
5
Efficient and Secure Scheme for Distributed Data Storage Systems
5