Author of the publication

Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.

, , and . Informatica (Slovenia), 37 (2): 149-156 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detection of Low-Rate Cloud DDoS Attacks in Frequency Domain Using Fast Hartley Transform., and . Wireless Personal Communications, 112 (3): 1735-1762 (2020)Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing., , and . Informatica (Slovenia), 37 (2): 149-156 (2013)Static/Dynamic Environmental Economic Dispatch Employing Chaotic Micro Bacterial Foraging Algorithm., , , and . SEMCCO (1), volume 7076 of Lecture Notes in Computer Science, page 585-592. Springer, (2011)Clustering Based on Trust of a Node in Mobile Ad-Hoc NETworks., , and . SSCC, volume 377 of Communications in Computer and Information Science, page 150-161. Springer, (2013)Integrated evolutionary neural network approach with distributed computing for congestion management., , and . Appl. Soft Comput., 10 (1): 251-260 (2010)A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks., and . SC², page 118-123. IEEE Computer Society, (2017)Trust evaluation in wireless ad hoc networks using fuzzy system., , and . CUBE, page 779-783. ACM, (2012)The impact of mobility and node capacity on voice traffic., , , , and . Int. J. Syst. Assur. Eng. Manag., 8 (2s): 1374-1382 (2017)On-line security monitoring and analysis using Levenberg-Marquardt algorithm-based Neural Network., , and . Int. J. Intell. Syst. Technol. Appl., 6 (1/2): 77-88 (2009)Web content adaptation classification and summarization in mobile devices., , , , , and . Mobility Conference, page 380-385. ACM, (2007)