Author of the publication

Distributed Scheme to Authenticate Data Storage Security in Cloud Computing

. International Journal of Computer Science & Information Technology (IJCSIT), 9 (6): 59 - 66 (December 2017)
DOI: 10.5121/ijcsit.2017.9606

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ontology based Distributed Personalized Searching for Peer-to-peer architecture using hierarchical neural networks evidence combination., , , and . ICDIM, page 269-274. IEEE, (2006)An Adaptively Automated Five-Class Fingerprint Classification Scheme Using Kohonens Feature Map and fuzzy ant clustering by centroid positioning., , , and . ICDIM, page 125-130. IEEE, (2006)AAFFC: An Adaptively Automated Five-Class Fingerprint Classification Scheme Using Kohonens Feature Map., , , and . ISDA (1), page 72-77. IEEE Computer Society, (2006)OPSHNN: Ontology Based Personalized Searching Using Hierarchical Neural Networks Evidence Combination., , , and . CIT, page 44. IEEE Computer Society, (2006)Distributed Scheme to Authenticate Data Storage Security in Cloud Computing. International Journal of Computer Science & Information Technology (IJCSIT), 9 (6): 59 - 66 (December 2017)A Design-Space Exploration for Allocating Security Tasks in Multicore Real-Time Systems., , , and . CoRR, (2017)On Scheduler Side-Channels in Dynamic-Priority Real-Time Systems., , , and . CoRR, (2020)A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds., , , , , and . CoRR, (2017)Next-Generation Access Control for Distributed Control Systems., , , , , , , , and . IEEE Internet Comput., 20 (5): 28-37 (2016)Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems., , , and . ACM Trans. Cyber Phys. Syst., 6 (3): 22:1-22:25 (2022)