Home
Call For Paper
E-Board
Archives
Volume-1
Volume-2
Volume-3
Volume-4
Volume-5
Volume-6
Volume-7
Volume-8
Volume-9
Volume-10
Volume-11
Volume-12
Volume-13
Fee
Indexing
Connect To Elsevier Center
Contact
ISSUE-2
ISSUE-3
Issue-4
ISSUE-5
ISSUE-6
ISSUE-1
Title
Page No
Download
COLLABORATIVE FILTERING BASED ON OBJECTIVE TIPICALITY FOR NEIGHBOUR RECOMMENDATION
Authors
:
A. MUKESH, Mr. B. SRAVAN KUMAR
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/01
01 - 09
Download
A Tamper-Proof Delegation of Computational Work to Remote Servers in Cloud With Policy Attribute-Based Encryption
Authors
:
T.Annapurna, Mr.K.Goutham Raju
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/02
10 - 17
Download
Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner
Authors
:
T. ANUSHA, Dr. T. SRINIVAS CHARY
DOI
:
: 10.48047/IJIEMR/V1/ISSUE 03/03
18 - 29
Download
Multivariate Correlation Analysis Based Denial of Service Attack Detection System
Authors
:
D.ASHWINI
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/04
30 - 42
Download
Optimizing the Capacity of Hybrid Wireless Network Using Distributed Three hop Routing Protocol
Authors
:
M.ASHWINI,Mr. K. BHANU PRASAD
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/05
43 - 49
Download
Cost effective dynamic migration of content into hybrid clouds
Authors
:
B.BHAVANI,B.SRAVAN KUMAR
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/06
50 - 62
Download
ACHIEVING DATA CONSISTENCY THROUGH QUERIES
Authors
:
N.Navya Deepthi, B.Saritha
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/07
63 - 76
Download
An Online Vacation Package Recommendation System
Authors
:
Md.Asma Kousar,A.Madhavi
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/08
77 - 87
Download
Anonymous Authentication Using Cloud Based Decentralized Access Control Scheme
Authors
:
K.SHIRISHA, A.SWETHA
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/09
88 - 94
Download
An Advance Scalable & Reliable Matching Service For Content Based Systems
Authors
:
N.SRAVAN KUMAR,Dr.V.JANAKI
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/10
95 - 103
Download
A Novel Family of Graphical Password Systems Integrating Captcha Technology
Authors
:
P. DIVYA,Mr.K.GOUTHAM RAJU
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/11
104 - 118
Download
Public Key Cipher Scheme For Rapid Keyword Search
Authors
:
G.HARIKA,M.SWAPNA
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/12
119 - 133
Download
A Security Model for Protecting Location Based Queries
Authors
:
N.PRASANNA,K.MAHESH
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/13
134 - 145
Download
To create convincing fake user secrets to protect user privacy
Authors
:
N.NISHMA,Mr.B.Krishna
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/14
146 - 152
Download
An Approach for Preserving Privacy of Shared Data in the Cloud
Authors
:
R.BHARATH, E.PRAVEEN
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/15
153 - 163
Download
MANAGEMENT INFORMATION SYSTEM FOR TRAINING PROGRAMMES – NAARM EXPERIENCES
Authors
:
VV SUMANTHKUMAR, 2ABHISHEK G
DOI
:
10.48047/IJIEMR/V1/ISSUE 03/16
164-169
Download