Author of the publication

A Privacy Preserving Representation for Web Service Communicators' in the Cloud.

, , , , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 496-506. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review on Edge Connectivity Framework for Handheld Computing., , and . IJHCR, 8 (4): 23-29 (2017)Internet of medical things and cloud enabled brain tumour diagnosis model using deep learning with kernel extreme learning machine., , , and . Int. J. Electron. Heal., 12 (3): 203-220 (2022)Advanced mobile agent security models for code integrity and malicious availability check., , , , and . J. Netw. Comput. Appl., 33 (6): 661-671 (2010)Improving Efficiency of Peer Network Applications by Formulating Distributed Spanning Tree., , and . ICETET, page 813-818. IEEE Computer Society, (2010)Swarm intelligence based classification rule induction (CRI) framework for qualitative and quantitative approach: An application of bankruptcy prediction and credit risk analysis., , and . J. King Saud Univ. Comput. Inf. Sci., 32 (6): 647-657 (2020)A Privacy Preserving Representation for Web Service Communicators' in the Cloud., , , , and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 496-506. Springer, (2013)MSRCC - Mitigation of Security Risks in Cloud Computing., , , and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 525-532. Springer, (2012)