Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compositional runtime enforcement revisited., , , and . Formal Methods Syst. Des., 59 (1): 205-252 (2021)Practical traceable multi-authority CP-ABE with outsourcing decryption and access policy updation., , and . J. Inf. Secur. Appl., (2020)Smart Grid Data Security using Practical CP-ABE with Obfuscated Policy and Outsourcing Decryption., , , and . CyberSA, page 1-8. IEEE, (2020)Model Based Verification of Spiking Neural Networks in Cyber Physical Systems., , , and . IEEE Trans. Computers, 72 (9): 2426-2439 (September 2023)Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata., , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 434-456. Springer, (2019)A Scalable Attribute Based Encryption for Secure Data Storage and Access in Cloud., , , and . Cyber Security, page 1-8. IEEE, (2019)Attribute-Based Data Security with Obfuscated Access Policy for Smart Grid Applications., , and . COMSNETS, page 503-506. IEEE, (2020)Self-Attention for Cyberbullying Detection., , and . CyberSA, page 1-6. IEEE, (2020)Bounded-memory runtime enforcement with probabilistic and performance analysis., , , , and . Formal Methods Syst. Des., 62 (1): 141-180 (June 2024)Knowledge, Attitude and Vaccination Status on Covid 19 among Adults Living in Selected Rural Areas of Khurdha District, Odisha. INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT, 7 (5): 662-667 (October 2023)