Author of the publication

A security-attribute-based access control along with user revocation for shared data in multi-owner cloud system.

, , and . Inf. Secur. J. A Glob. Perspect., 30 (6): 309-324 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An effective image retrieval system using machine learning and fuzzy c- means clustering approach., , and . Multim. Tools Appl., 79 (15-16): 10123-10140 (2020)Echo state learned compositional pattern neural networks for the early diagnosis of cancer on the internet of medical things platform., , , , and . J. Ambient Intell. Humaniz. Comput., 12 (3): 3303-3316 (2021)PIRAP: AASM: An Advanced Attribute-Based Security Model for Enhancing Trustworthy Data Sharing in Cloud Computing., , and . Int. J. Cooperative Inf. Syst., 33 (1): 2350008:1-2350008:20 (March 2024)Deep learning and spark architecture based intelligent brain tumor MRI image severity classification., and . Biomed. Signal Process. Control., (2022)A Detailed Survey on Swarm Intelligence Algorithms for Efficient Optimal Path Selection in WSN for Effective Online Business Platform., , and . Ad Hoc Sens. Wirel. Networks, 51 (1-3): 113-140 (2022)Channel aware optimized proportional fair scheduler for LTE downlink., , , , and . Peer-to-Peer Netw. Appl., 13 (6): 2135-2144 (2020)A security-attribute-based access control along with user revocation for shared data in multi-owner cloud system., , and . Inf. Secur. J. A Glob. Perspect., 30 (6): 309-324 (2021)Identification of IoT Device From Network Traffic Using Artificial Intelligence Based Capsule Networks., , , , , and . Wirel. Pers. Commun., 123 (3): 2227-2243 (2022)Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud., , and . Comput. Syst. Sci. Eng., 47 (1): 1109-1123 (2023)Digital watermarking techniques for image security: a review., , , , and . J. Ambient Intell. Humaniz. Comput., 11 (8): 3221-3229 (2020)