Journal: IJIPT

Volume 16, Issue 1

1 -- 10Hai-yan Kang, Jie Deng. A cross encryption scheme for data security storage in cloud computing environment
11 -- 33Ummer Iqbal, Ajaz Hussain Mir. Practical and scalable access control mechanism for wireless sensor networks
34 -- 45Shilpee Prasad, B. R. Purushothama. Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server
46 -- 57Rushdi A. Hamamreh, Mohammed R. Ayyad, Mohammed AbuTaha. RAD: reinforcement authentication model based on DYMO protocol for MANET
58 -- 67Haiyan Kang, Yaping Feng, Xiameng Si, Kaili Lu. Research on personalised privacy-preserving model of multi-sensitive attributes
68 -- 74Bhushana Samyuel Neelam, Benjamin A. Shimray. Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA)