Author of the publication

Securing of Clouds Based on Lightweight Secure Multi-party Computation.

, and . CISIS, volume 772 of Advances in Intelligent Systems and Computing, page 452-464. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OSI Testing Environment Based on the Standardized Formalisms., , , and . FORTE, page 287-294. North-Holland, (1990)Deterrence System for Texting-While-Walking Focused on User Situation., and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 319-332. Springer, (2018)Improved Vanishing Point Accuracy by Integrating Vehicle Detection and Segmentation., and . IV, page 882-887. IEEE, (2022)125-µm-cladding 8-core multi-core fiber realizing ultra-high-density cable suitable for O-band short-reach optical interconnects., , , , , , , , and . OFC, page 1-3. IEEE, (2015)Estimation of Trustworthiness for P2P System in Collusive Attack.. CISIS, page 171-178. IEEE Computer Society, (2007)A Key Distribution and Rekeying Framework with Totally Ordered Multicast Protocols., and . ICOIN, page 831-842. IEEE Computer Society, (2001)Noah: an environment for distributed autonomous systems., , , and . ISADS, page 412-418. IEEE Computer Society, (1995)An Improvement in Zone Routing Protocol Using Bloom Filter., and . NBiS, page 107-113. IEEE Computer Society, (2016)Anomaly Detection of Solar Power Generation Systems Based on the Normalization of the Amount of Generated Electricity., , , , , and . AINA, page 294-301. IEEE Computer Society, (2015)TENT: Test Sequence Generation Tool for Communication Systems., , and . FORTE, page 1-5. North-Holland, (1989)