A CONCRETE DCONBE SCHEME FOR KEY MANAGEMENT IN FOG COMPUTING
[View]
1RAVULA HIMAKETHANA, 2KAMBHAM SALIVAHANA REDDY
Cloud computing is an attractive criterion for accessing virtually unlimited storage and computational resources.
1RAVULA HIMAKETHANA, 2KAMBHAM SALIVAHANA REDDY
Cloud computing is an attractive criterion for accessing virtually unlimited storage and computational resources.
DATA SECURITY AND PRIVACY FOR GROUP DATA SHARING IN MULTIPLE DATA OWNERS AND ACCESSORS
[View]
1MOPURI PRIYANKA 2KAMBHAM SALIVAHANA REDDY
With the rapid development of cloud services, huge volume of data is shared via cloud confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over cipher text associated with multiple owners, which makes co-owners unable to appropriately control whether data disseminators can actually disseminate their data.
1MOPURI PRIYANKA 2KAMBHAM SALIVAHANA REDDY
With the rapid development of cloud services, huge volume of data is shared via cloud confidentiality in cloud computing, current mechanisms cannot enforce privacy concerns over cipher text associated with multiple owners, which makes co-owners unable to appropriately control whether data disseminators can actually disseminate their data.
PRESERVING PRIVACY IN SMGS FOR INFERENTIAL ATTACKS
[View]
1 YADALA YAMINI 2 KAMBHAM SALIVAHANA REDDY
In developing countries, reliable electricity access is often undermined by the absence of supply from the national power grid and/or load shedding.
1 YADALA YAMINI 2 KAMBHAM SALIVAHANA REDDY
In developing countries, reliable electricity access is often undermined by the absence of supply from the national power grid and/or load shedding.
SECURE ORGANIZATIONAL DATA SHARING BETWEEN USERS USING DIFFIE-HELLMAN
[View]
1 REDDEM VASUDEVA REDDY,2 KAMBHAM SALIVAHANA REDDY
Cloud computing is an emerging technology which provides various types of facilities to the users.
1 REDDEM VASUDEVA REDDY,2 KAMBHAM SALIVAHANA REDDY
Cloud computing is an emerging technology which provides various types of facilities to the users.
THE FIRST CERTIFICATE LESS PUBLIC VERIFICATION SCHEME AGAINST PROCRASTINATING AUDITORS BY USING BLOCK CHAIN TECHNOLOGY
[View]
1 RAYANAPETA MOUNIKA 2 KAMBHAM SALIVAHANA REDDY
Blockchain is challenging the status quo of the central trust infrastructure currently prevalent in the Internet towards a design principle that is underscored by decentralization and transparency.
1 RAYANAPETA MOUNIKA 2 KAMBHAM SALIVAHANA REDDY
Blockchain is challenging the status quo of the central trust infrastructure currently prevalent in the Internet towards a design principle that is underscored by decentralization and transparency.
INVESTIGATION ON STRENGTH CHARACTERISTICS OF CONCRETE BY USING DISCRETE WASTE
[View]
MEKA USHASWINI 1, SJ BASHA 2
The mechanical and monetary development saw in late decades has carried with it an expansion in the age of various kinds of waste (urban, modern, development, and so forth.) in spite of the waste administration arrangements which have been embraced broadly and universally the act of dumping as well as the insufficient administration of waste from the different assembling divisions have notably affected the getting condition.
MEKA USHASWINI 1, SJ BASHA 2
The mechanical and monetary development saw in late decades has carried with it an expansion in the age of various kinds of waste (urban, modern, development, and so forth.) in spite of the waste administration arrangements which have been embraced broadly and universally the act of dumping as well as the insufficient administration of waste from the different assembling divisions have notably affected the getting condition.
Pages [1]

This work is licensed under a Creative Commons Attribution 3.0 License.
© 2011 - 2020 International Journal of Engineering In Advanced Research Science and Technology
Managed By Indian Association for Reliability and Statistics
International Journal of Engineering In Advanced Research Science and Technology ISSN : 2350-0174 (Online)
All rights reserved withinfo.ijearst.co.in.
To make sure that you can receive messages from us, please add the 'ijearst.co.in' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
For any Technical Support contact @info.ijearst.co.in