Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,†IEEE Communications Surveys & Tutorials,, vol. 15, no. 2, pp. 843–859, 2013. [2] M. L. Yiu, G. Ghinita, C. S. Jensen, and P. Kalnis, “Enabling search services on outsourced private spatial data,†The VLDB Journal, vol. 19, no. 3, pp. 363–384, 2010. [3] P. Wang and C. V. Ravishankar, “Secure and efficient range queries on outsourced databases using r-trees,†in 2013 IEEE 29th International Conference on Data Engineering (ICDE). IEEE, 2013, pp. 314–325. [4] A. M. Talha, I. Kamel, and Z. A. Aghbari, “Enhancing confidentiality and privacy of outsourced spatial data,†in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE, 2015, pp. 13–18. [5] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,†in IEEE Infocom, 2010 proceedings. IEEE, 2010, pp. 1–9. [6] H. Xu, S. Guo, and K. Chen, “Building confidential and efficient query services in the cloud with rasp data perturbation,†IEEE transactions on knowledge and data engineering, vol. 26, no. 2, pp. 322–335, 2014. [7] H. Hu, J. Xu, C. Ren, and B. Choi, “Processing private queries over untrusted data cloud through privacy homomorphism,†in IEEE 27th International Conference on Data Engineering. IEEE, 2011, pp. 601– 612. [8] G. Zhao, C. Rong, J. Li, F. Zhang, and Y. Tang, “Trusted data sharing over untrusted cloud storage providers,†in IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2010, pp. 97–103. [9] H. Hacigum¨ us, B. Iyer, and S. Mehrotra, “Providing database as a ¨ service,†in 18th International Conference on Data Engineering, 2002. Proceedings. IEEE, 2002, pp. 29–38. [10] E. Damiani, S. Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati, “Balancing confidentiality and efficiency in untrusted relational dbmss,†in Proceedings of the 10th ACM conference on Computer and Communications Security. ACM, 2003, pp. 93–102. [11] W.-S. Ku, L. Hu, C. Shahabi, and H. Wang, “Query integrity assurance of location-based services accessing outsourced spatial databases,†in Advances in Spatial and Temporal Databases. Springer, 2009, pp. 80– 97. [12] A. Khoshgozaran and C. Shahabi, “Private buddy search: Enabling private spatial queries in social networks,†in International Conference on Computational Science and Engineering, 2009 (CSE’09)., vol. 4. IEEE, 2009, pp. 166–173. [13] Anil Kumar Uppula , Srinivasulu Tadisetty ,†Achieving better Authentication and Copyright protection Using DWT and SVD Based Watermarking Scheme,â€International Journal of Computer Engineering In Research Trends.,vol.3,no.9,pp.487-491,September 2016. [14] Venkata Srinivasu Veesam, Bandaru Satish Babu,†Evaluation of Captcha Technologies towards Graphical Password Scheme,†International Journal of Computer Engineering In Research Trends.,vol.2,no.1,pp.98-106,February 2015. [15] D.J. Ashpin Pabi, N.Puviarasan, P.Aruna,†Fast Singular value decomposition based image compression using butterfly particle swarm optimization technique (SVD-BPSO),†International Journal of Computer Engineering In Research Trends.,vol.4,no.4,pp.128-135,April 2017.
![]() | V4I7004.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|