S.NO | TITLE | PAGE NO | DOWNLOAD | |
IJATIR 263 | A Certification Authority Based Provenance Assurance Scheme for Protecting Location Proof and Users Privacy Authors:DR. T. SWARNALATHA, SK. KHAJA MASTHAN SHAREEF |
1361-1364 |
Download | |
IJATIR 264 | Design and Implement an Adaptive Routing Scheme with Low Jamming For Wireless Networks Authors:MUNIRAJU NAIDU VADLAMUDI, M. NARESH KUMAR |
1365-1367 |
Download | |
IJATIR 265 | Ensuring Security for Data Leakage in Malicious Environments Using Data Lineage Mechanism Authors:RAMIREDDY NAVATEJAREDDY, K. JEEVITHA |
1368-1371 |
Download | |
IJATIR 266 | A Novel Secure Keyword Search Ability Scheme using DS-PEKS with SPHF in Cloud Storage Systems Authors:DR. B. GEETHAVANI, L. K. SATHYA SUNEETHA |
1372-1375 |
Download | |
IJATIR 267 | An Adaptive Framework for Identifying User Aware RSP in Online Documents Authors:JVS. M. RAJU, S. SUSMITHA |
1376-1378 |
Download | |
IJATIR 268 | Smart Vehicle Security System using GSM & GPS Authors:B. VEENA RANI |
1379-1382 |
Download | |
IJATIR 170 | Design and Implementation of High Speed SOBL MASTROVITO Multiplier Authors:R. SANDHYA RANI, K. GOVINDA RAO |
0914-0918 |
Download | |
Submission Open for 2021 |
Last Date of Submission : |
20th, October-2021 |
Acceptance Notification : |
After Peer Review |
Last Date of Publication : |
30th, October-2021 |