From post

A Biometric-Based Encryption Method for Secure Data Sharing in Cloud Environment.

, , , и . SNSFAIT, том 3390 из CEUR Workshop Proceedings, стр. 17-26. CEUR-WS.org, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Energy-efficient fog computing in Internet of Things based on Routing Protocol for Low-Power and Lossy Network with Contiki., , , , , и . Int. J. Commun. Syst., (2022)Dynamical behaviors and abundant optical soliton solutions of the cold bosonic atoms in a zig-zag optical lattice model using two integral schemes., и . Math. Comput. Simul., (2022)Defected Ground Split Ring Resonator-Based Sensor for Adulteration Detection in Fluids., , , и . Wirel. Pers. Commun., 121 (3): 1593-1606 (2021)Insights and reflections using data analytics approach of COVID-19 situation among the Indian states and ethical considerations., , , , и . Int. J. Syst. Assur. Eng. Manag., 13 (1): 131-142 (2022)iCACD: an intelligent deep learning model to categorise current affairs news article for efficient journalistic process., , , , и . Int. J. Syst. Assur. Eng. Manag., 13 (5): 2572-2582 (2022)CAMTA: Casual Attention Model for Multi-touch Attribution., , , , , и . CoRR, (2020)Gen-Z: Generative Zero-Shot Text Classification with Contextualized Label Descriptions., , и . CoRR, (2023)Generalised two-Component modified Weakly dissipative Dullin-Gottwald-Holm System: invariance Analysis and conservation Laws., и . Math. Model. Anal., 27 (1): 101-116 (2022)Precision Sugarcane Monitoring Using SVM Classifier., , , и . ITQM, том 122 из Procedia Computer Science, стр. 881-887. Elsevier, (2017)Cyber Security Protocol for Secure Traffic Monitoring Systems using PUF-based Key Management., , , и . iSES, стр. 103-108. IEEE, (2020)