×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
a-light-weight-secure-provenance-scheme-in-detecting-forgery-and-packet-drop-attack-in-wsn-IJERTCONV4IS22058.pdf
Home
/
Discover
/
www.ijert.org
/
research
/
Parent Folder
a-light-weight-secure-provenance-scheme-in-detecting-forgery-and-packet-drop-attack-in-wsn-IJERTCONV4IS22058.pdf
PDF
2 years ago
Get Size
Copy Link
secure-cloud-data-in-decomposition-of-encrypted-tensor-using-homomorphic-encryption-scheme-IJERTCONV4IS22070.pdf
PDF
2 years ago
Get Size
Copy Link
protecting-collusion-attack-and-efficient-data-sharing-scheme-for-vital-group-in-cloud-IJERTCONV4IS22059.pdf
PDF
2 years ago
258.17 kB
Copy Link
progressive-web-apps-a-new-way-to-experience-mobile-IJERTCONV4IS22069.pdf
PDF
2 years ago
Get Size
Copy Link
resource-attainment-prototype-design-in-cloud-computing-IJERTCONV4IS22060.pdf
PDF
2 years ago
Get Size
Copy Link
sensovision-an-aid-for-the-visually-impaired-IJERTCONV4IS22068.pdf
PDF
2 years ago
659.29 kB
Copy Link
establishing-a-session-key-between-user-and-storage-device-in-parallel-network-file-system-IJERTCONV4IS22061.pdf
PDF
2 years ago
Get Size
Copy Link
front-and-back-mechanism-based-task-scheduling-in-cloud-IJERTCONV4IS22062.pdf
PDF
2 years ago
446.77 kB
Copy Link
multiple-image-steganography-using-lsb-dct-technique-IJERTCONV4IS22067.pdf
PDF
2 years ago
667.18 kB
Copy Link
a-novel-scheme-for-cost-reduction-and-data-availability-in-heterogeneous-multi-cloud-IJERTCONV4IS22066.pdf
PDF
2 years ago
229.83 kB
Copy Link
the-mi-technique-for-edit-recommendation-IJERTCONV4IS22054.pdf
PDF
2 years ago
Get Size
Copy Link
a-secure-greedy-depth-first-search-algorithm-for-encrypted-data-in-cloud-computing-environment-IJERTCONV4IS22065.pdf
PDF
2 years ago
Get Size
Copy Link
malevolent-file-detection-in-short-range-communication-IJERTCONV4IS22055.pdf
PDF
2 years ago
Get Size
Copy Link
application-of-language-model-in-atc-IJERTCONV4IS22077.pdf
PDF
2 years ago
Get Size
Copy Link
a-time-efficient-approach-for-detecting-errors-in-big-sensor-data-on-cloud-IJERTCONV4IS22056.pdf
PDF
2 years ago
Get Size
Copy Link
qam-receiver-for-rayleigh-fading-channel-IJERTCONV4IS22076.pdf
PDF
2 years ago
Get Size
Copy Link
structured-gathering-of-the-deep-web-interaction-for-two-stage-crawler-IJERTCONV4IS22057.pdf
PDF
2 years ago
Get Size
Copy Link
automatic-demand-draft-generation-using-the-automated-teller-machine-IJERTCONV4IS22075.pdf
PDF
2 years ago
Get Size
Copy Link
spoofing-attack-detection-based-on-passive-ip-backtrace-IJERTCONV4IS22046.pdf
PDF
2 years ago
Get Size
Copy Link
secret-image-protection-using-image-fusion-IJERTCONV4IS22074.pdf
PDF
2 years ago
Get Size
Copy Link
Join FilePursuit on
chat for discussions and more information.