Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things., , , , and . COMPSAC, page 1237-1242. IEEE, (2023)Securing SQL with Access Control for Database as a Service Model., and . ICTCS, page 104:1-104:6. (2016)LoRaWAN Scheduling Mechanism for 6G-Based LEO Satellite Communications., , , , and . VTC Spring, page 1-5. IEEE, (2024)Bloom Filter Based Privacy Preserving Deduplication System., , , , and . ISEA-ISAP, volume 939 of Communications in Computer and Information Science, page 17-34. Springer, (2018)Secure and Efficient Key Management for Deduplicated Cloud Storage Systems., , , , , and . SIN, page 1-6. IEEE, (2023)Powering Europe's Energy Transition: Financial Viability of a Full-Scale Meshed HVDC Grid and Hybrid Offshore Assets in the North Sea., , , , and . ISGT EUROPE, page 1-6. IEEE, (2023)Cryptographic File Systems Performance: What You Don't Know Can Hurt You., , and . IEEE Security in Storage Workshop, page 47-61. IEEE Computer Society, (2003)Security Enhancement of OTAA based Joining Procedure in LoRaWAN for Satellite Communication., and . VTC Spring, page 1-5. IEEE, (2024)Key Definitions, Concepts And Setting Up of A Company Under Companies Act 2013. International Journal of Trend in Scientific Research and Development, 1 (4): 622-631 (June 2017)