Author of the publication

Achieving cloud security using third party auditor, MD5 and identity-based encryption

, and . 2016 International Conference on Computing, Communication and Automation (ICCCA), page 1304--1309. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Energy-Efficient Scheme for RPL Attacker Identification in IoT Networks Using Discrete Event Modeling., , , , and . IEEE Access, (2023)LORD: LOw Rate DDoS Attack Detection and Mitigation Using Lightweight Distributed Packet Inspection Agent in IoT Ecosystem., , and . ANTS, page 1-6. IEEE, (2019)ML for IEEE 802.15. 4e/TSCH: Energy Efficient Approach to Detect DDoS Attack Using Machine Learning., , and . IWCMC, page 1477-1482. IEEE, (2021)Effective injection of adversarial botnet attacks in IoT ecosystem using evolutionary computing., , and . Internet Technol. Lett., (July 2023)OPTIMIST: Lightweight and Transparent IDS With Optimum Placement Strategy to Mitigate Mixed-Rate DDoS Attacks in IoT Networks., , , and . IEEE Internet Things J., 10 (10): 8357-8370 (May 2023)Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi Deployment., , , and . ICDCIT, volume 10722 of Lecture Notes in Computer Science, page 189-204. Springer, (2018)Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength., , , and . ICACCI, page 1981-1986. IEEE, (2017)ReFIT: Reliability Challenges and Failure Rate Mitigation Techniques for IoT Systems., , and . I4CS, volume 1139 of Communications in Computer and Information Science, page 123-142. Springer, (2020)BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network., , , and . I4CS, volume 1139 of Communications in Computer and Information Science, page 208-223. Springer, (2020)Achieving cloud security using third party auditor, MD5 and identity-based encryption, and . 2016 International Conference on Computing, Communication and Automation (ICCCA), page 1304--1309. IEEE, (2016)