From post

An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage.

, , и . J. King Saud Univ. Comput. Inf. Sci., 35 (9): 101745 (октября 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Prediction of Malignant Melanoma Incidence., и . Modelling and Simulation, стр. 234-239. IASTED/ACTA Press, (2003)Hybrid feature selection technique for intrusion detection system., , и . IJHPCN, 13 (2): 232-240 (2019)A Review of Critical Infrastructure Protection Approaches: Improving Security through Responsiveness to the Dynamic Modelling Landscape., , , , и . CoRR, (2019)Preparing computing students for culturally diverse e-mediated IT projects., , , и . Interact. Technol. Smart Educ., 3 (3): 185-195 (2006)Trust Issues on Crowd-Sourcing Methods for Urban Environmental Monitoring., , , и . Int. J. Distributed Syst. Technol., 3 (1): 35-47 (2012)Analysis of IoT-Based Load Altering Attacks Against Power Grids Using the Theory of Second-Order Dynamical Systems., , и . CoRR, (2020)Fuzzy Logic-Based Novel Hybrid Fuel Framework for Modern Vehicles., , , , , , , , и . IEEE Access, (2020)An Effective Mechanism to Mitigate Real-Time DDoS Attack., , , , , , , и . IEEE Access, (2020)Malware Detection: A Framework for Reverse Engineered Android Applications Through Machine Learning Algorithms., , , , и . IEEE Access, (2022)Privacy Challenges With Protecting Live Vehicular Location Context., , , , и . IEEE Access, (2020)