Title Page No Download
COLLABORATIVE FILTERING BASED ON OBJECTIVE TIPICALITY FOR NEIGHBOUR RECOMMENDATION
Authors: A. MUKESH, Mr. B. SRAVAN KUMAR
DOI: 10.48047/IJIEMR/V1/ISSUE 03/01
01 to 09 Download
A Tamper-Proof Delegation of Computational Work to Remote Servers in Cloud With Policy Attribute-Based Encryption
Authors: T.Annapurna, Mr.K.Goutham Raju
DOI: 10.48047/IJIEMR/V1/ISSUE 03/02
10 to 17 Download
Enhanced and Secure Query Services in Cloud with Perfect Data Privacy for the Data Owner
Authors: T. ANUSHA, Dr. T. SRINIVAS CHARY
DOI: : 10.48047/IJIEMR/V1/ISSUE 03/03
18 to 29 Download
Multivariate Correlation Analysis Based Denial of Service Attack Detection System
Authors: D.ASHWINI
DOI: 10.48047/IJIEMR/V1/ISSUE 03/04
30 to 42 Download
Optimizing the Capacity of Hybrid Wireless Network Using Distributed Three hop Routing Protocol
Authors: M.ASHWINI,Mr. K. BHANU PRASAD
DOI: 10.48047/IJIEMR/V1/ISSUE 03/05
43 to 49 Download
Cost effective dynamic migration of content into hybrid clouds
Authors: B.BHAVANI,B.SRAVAN KUMAR
DOI: 10.48047/IJIEMR/V1/ISSUE 03/06
50 to 62 Download
ACHIEVING DATA CONSISTENCY THROUGH QUERIES
Authors: N.Navya Deepthi, B.Saritha
DOI: 10.48047/IJIEMR/V1/ISSUE 03/07
63 to 76 Download
An Online Vacation Package Recommendation System
Authors: Md.Asma Kousar,A.Madhavi
DOI: 10.48047/IJIEMR/V1/ISSUE 03/08
77 to 87 Download
Anonymous Authentication Using Cloud Based Decentralized Access Control Scheme
Authors: K.SHIRISHA, A.SWETHA
DOI: 10.48047/IJIEMR/V1/ISSUE 03/09
88 to 94 Download
An Advance Scalable & Reliable Matching Service For Content Based Systems
Authors: N.SRAVAN KUMAR,Dr.V.JANAKI
DOI: 10.48047/IJIEMR/V1/ISSUE 03/10
95 to 103 Download
A Novel Family of Graphical Password Systems Integrating Captcha Technology
Authors: P. DIVYA,Mr.K.GOUTHAM RAJU
DOI: 10.48047/IJIEMR/V1/ISSUE 03/11
104 to 118 Download
Public Key Cipher Scheme For Rapid Keyword Search
Authors: G.HARIKA,M.SWAPNA
DOI: 10.48047/IJIEMR/V1/ISSUE 03/12
119 to 133 Download
A Security Model for Protecting Location Based Queries
Authors: N.PRASANNA,K.MAHESH
DOI: 10.48047/IJIEMR/V1/ISSUE 03/13
134 to 145 Download
To create convincing fake user secrets to protect user privacy
Authors: N.NISHMA,Mr.B.Krishna
DOI: 10.48047/IJIEMR/V1/ISSUE 03/14
146 to 152 Download
An Approach for Preserving Privacy of Shared Data in the Cloud
Authors: R.BHARATH, E.PRAVEEN
DOI: 10.48047/IJIEMR/V1/ISSUE 03/15
153 to 163 Download
MANAGEMENT INFORMATION SYSTEM FOR TRAINING PROGRAMMES – NAARM EXPERIENCES
Authors: VV SUMANTHKUMAR, 2ABHISHEK G
DOI: 10.48047/IJIEMR/V1/ISSUE 03/16
164-169 Download