Author of the publication

Simplified and Efficient Framework for Securing Medical Image Processing Over Cloud Computing.

, , and . SCA, volume 37 of Lecture Notes in Networks and Systems, page 789-802. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting medical data in cloud storage using fault-tolerance mechanism., , and . ICSDE, page 214-219. ACM, (2017)A Secured Data Processing Technique for Effective Utilization of Cloud Computing., , and . J. Data Min. Digit. Humanit., (2018)Security in Cloud-Based Medical Image Processing: Requirements and Approaches., , and . BDCA, page 6:1-6:6. ACM, (2017)A Cloud-based Framework to Secure Medical Image Processing., , and . J. Mobile Multimedia, 14 (3): 319-344 (2018)Optimal Virtual Machine Provisioning in Cloud Computing Using Game Theory., , and . CBI, volume 416 of Lecture Notes in Business Information Processing, page 307-321. Springer, (2021)Simplified and Efficient Framework for Securing Medical Image Processing Over Cloud Computing., , and . SCA, volume 37 of Lecture Notes in Networks and Systems, page 789-802. Springer, (2017)Towards Optimizing the Usability of Homomorphic Encryption in Cloud-Based Medical Image Processing., , and . UNet, volume 10542 of Lecture Notes in Computer Science, page 214-224. Springer, (2017)Shapley Values for Explaining the Black Box Nature of Machine Learning Model Clustering., , , and . ANT/EDI40, volume 220 of Procedia Computer Science, page 806-811. Elsevier, (2023)Game theoretical approach for a fair and effective pricing strategy in cloud computing., , , and . Int. J. High Perform. Syst. Archit., 10 (1): 43-55 (2021)Applying homomorphic encryption for securing cloud database., , and . CIST, page 658-664. IEEE, (2016)