S.No | Name of the faculty | Title of the paper | journal paper | vol&issue number | ISSN NO | page number(s) | year |
1 | Y . SHANKAR RAO | Woral : A Witness Oriented Secure Location Attribution Framework for Cellular Phone Devices | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 213 - 220 | 2017 |
2 | Y . SHANKAR RAO | Traffic De-Correlation Techniques for Countering A World Eavesdropper in Wireless Sensor Networks | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 241 - 249 | 2017 |
3 | Y . GOPI | Circuit Cipher Text-Policy Attribute-Based Hybrid Cryptography With Demonstrable Delegation In Cloud Computing | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 197 - 201 | 2017 |
4 | Y . GOPI | Data Activity in Homomorphically Encryptedcal Pictures for Corroboratory their Reliableness in Each EnCrypted and Special Domains | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 294 - 299 | 2017 |
5 | Y . GOPI | Contributory Broadcast Coding with Efficient Coding and Short Ciphertext | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 229 - 234 | 2017 |
6 | Y . GOPI | Analysis of pseudony mization approaches for providing security in electronic healih record system | IJTRE | Volume 4 ISSUE 10 | 2347-4718 | 2163 - 2165 | 2017 |
7 | Y. GOPI | RESEARCH ON IMPROVEMENTS OF EDUCATIONAL SYSTEM IN EDUCATIONAL DATA MINING | IJTRE | Volume 4 ISSUE 10 | 2347 - 4718 | 2160 - 2162 | 2017 |
8 | Y. GOPI | PERMITTING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES | IJSRCSEIT | Volume 4 ISSUE 2 | 2456-3307 | 451-453 | 2017 |
9 | G . BHARATHI | Automatic Irrigation System for Smart City Using PLC AND SCADA | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 309 - 314 | 2017 |
10 | G . BHARATHI | SPLAYNET : Towards Nearby Self-Adjusting Wireless Networks | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 221 - 228 | 2017 |
11 | G . BHARATHI | IDENTIFYING NODE FAILURES IN CELLULAR WIRELESS NETWORK SYSTEMS: A PROBABILISTIC APPROACH |
IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 462-465 | 2017 |
12 | G . BHARATHI | SUPERIOR-GRAINED DUAL-FACTOR ACCESS CONTROL DESIGNED FOR WEB-BASED CLOUD COMPUTING SERVICES | IJSRCSEIT | Volume 1 Issue 1 | 2456-3307 | 438-440 | 2017 |
13 | G . BHARATHI | Identity-based cryptography with Outsourced Revocation in Cloud Computing | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 268 -- 273 | 2017 |
14 | B . ANKAMMARAO | Cross-Domain Opinion Classification Exploitation Enhanced Sentiment Sensitive Thesaurus Aware Embeddings | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 315 - 318 | 2017 |
15 | B . ANKAMMARAO | REASONABLE ESTIMATED K NEAREST NEIGHBOUR QUERIES WITH LOCALITY AND QUERY PRIVACY | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 424-433 | 2017 |
16 | B . ANKAMMARAO | SECURITY ANALYZE OUTSOURCED ASSOCIATION RULE MINING ON VERTICALLY PARTITIONED DATABASES | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 441-446 | 2017 |
17 | B . ANKAMMARAO | CLUSTERING WITH MULTI-POINT OF VIEW BASED COMPARISON EVALUATE | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 434-437 | 2017 |
18 | B . ANKAMMARAO | Secure Improvement Computation Outsourcing In Cloud Computing : A Case Study of Linear Programming | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 235 - 240 | 2017 |
19 | B . ANKAMMARAO | Security and Privacy Issues in Cloud Computing | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 274 - 279 | 2017 |
20 | S . SANKEERTHI | Dynamic and Public Auditing with truthful Arbitration for Cloud Knowledge | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 250 - 256 | 2017 |
21 | S . SANKEERTHI | Hidden Ciphertext Policy Attribute-Based encoding below customary Assumptions | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 257 - 262 | 2017 |
22 | S . SANKEERTHI | Towards Achieving Knowledge Security with the Cloud Computing Implementation Framework | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 202 - 212 | 2017 |
23 | S . SANKEERTHI | A PROTECTED AND ACTIVE MULTI-KEYWORD RANKED EXPLORE SCHEME OVER ENCRYPTED CLOUD DATA SYSTEMS | IJSRCSEIT | Volume 1 Issue 1 | 2456-3307 | 2017 | |
24 | S . SANKEERTHI | Dynamic Routing For knowledge Integrity and Delay differentiate Services in WSN | IJSRCSEIT | Volume 2 Issue 4 | 2456-3307 | 263 -- 267 | 2017 |
25 | G.bharathi | "Generating Efficiency and robustness dynamic query forms for advanced database quries” | URIT | volume 3 issues 11 | 2001-5569 | 25-29 | 2015 |
26 | Y . SHANKAR RAO | Generating Efficiency and robustness dynamic query forms for advanced database quries” volume 3 issue 11 | IJRIT | Volume 3 ISSUE 11 | 2001-5569 | 25-29 | 2015 |
27 | Y . SHANKAR RAO | An approach towards pricing under control in acces network. | IJRRECS | Volume 2 ISSUE 3 | 2321-5461 | 2134-2139 | 2014 |
28 | Y . SHANKAR RAO | Efficient service of video sharing and streaming over the could | IJATIR | Volume 6 ISSUE 7 | 2348-2370 | 669-672 | 2014 |
29 | Y . SHANKAR RAO | Mona an infulence: vendor locking in meta cloud | IJCST | Volume 5 ISSUE 4 | 0976-8491 | 2014 | |
30 | B . ANKAMMARAO | Semantic Keywords Extraction Mechanism in Mobile Agent for Cloud Computing in Internet Environment | IJSETR journal | Volume 3 | 2319-8885 | 6246-6250 | 2014 |
31 | M . NIRIKSHAN KUMAR | Analysis of authentication schemas for filtering injected false data in WSN | IJRCSE | VLOUME 2 ISSUE 2 | IJRCSEV2/2-202 | :10-23 | 2013 |
32 | Y . SHANKAR RAO | Enhancing security by broading nymble system in anonymizing network. | JGRCS | Volume 3 ISSUE 6 | 2229-371X | 121-125 | 2013 |
33 | Y . SHANKAR RAO | Gusture based communication A Gesture Human OID | IRNET | 2011 |