Author of the publication

Secure Private Cloud Architecture for Mobile Infrastructure as a Service.

, , , and . SERVICES, page 149-154. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dual-level defense for networks under DDoS attacks., and . SAC, page 733-734. ACM, (2010)Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks., and . ICISS, volume 4812 of Lecture Notes in Computer Science, page 259-262. Springer, (2007)Identity management framework for cloud based internet of things., and . SECURIT, page 200-203. ACM, (2012)Protecting web applications from SQL injection attacks by using framework and database firewall., and . ICACCI, page 609-613. ACM, (2012)Secret information display based authentication technique towards preventing phishing attacks., , and . ICACCI, page 602-608. ACM, (2012)Implementing private cloud at IIT Roorkee: an initial experience., , and . ICACCI, page 453-458. ACM, (2012)Key Distribution Schemes in Wireless Sensor Networks: Novel Classification and Analysis., and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 43-53. Springer, (2012)IDS Based Defense for Cloud Based Mobile Infrastructure as a Service., , and . SERVICES, page 199-202. IEEE Computer Society, (2012)Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ., and . ICON, page 1-7. IEEE, (2008)Searching in internet of things using VCS., and . SECURIT, page 63-67. ACM, (2012)