Author of the publication

A Paramount Pair of Cache Replacement Algorithms on L1 and L2 Using Multiple Databases with Security.

, , and . ICETET, page 346-351. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security issues in MANET: A review., , and . WOCN, page 1-4. IEEE, (2010)Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network., , , and . WOCN, page 1-6. IEEE, (2010)A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm., , and . WOCN, page 1-6. IEEE, (2019)Key Issues of Security and Integrity in Third Party Association Rule Mining., , , and . ICETET, page 337-340. IEEE Computer Society, (2009)Simulation of Collision Resistant Secure Sum Protocol., , and . CoRR, (2014)Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation, , and . CoRR, (2010)Strategic Game theory models and commercialization for Nano RFID systems., , , and . WOCN, page 1-5. IEEE, (2010)A Method for Load Balancing and Energy Optimization in Cloud Computing Virtual Machine Scheduling., , and . UKCI, volume 1453 of Advances in Intelligent Systems and Computing, page 325-335. Springer, (2023)Congestion Control during Data Privacy in Secure Multiparty Computation., , , , and . ICETET, page 330-332. IEEE Computer Society, (2009)Electronic Data Interchange: A Review., , , and . CICSyN, page 323-327. IEEE Computer Society, (2011)