Author of the publication

Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.

, , , , and . IEEE Cloud Comput., 2 (2): 30-38 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Edge of Things for Smart Healthcare Surveillance Framework., , , and . IEEE Access, (2019)A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems., , , , and . IEEE Trans. Ind. Informatics, 18 (7): 5007-5017 (2022)A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living., , , , and . ACM Trans. Internet Techn., 22 (3): 57:1-57:25 (2022)Multi-objective optimisation for selective packet discarding in wireless sensor network., , and . IET Wirel. Sens. Syst., 5 (3): 124-136 (2015)Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care., and . IEEE Trans. Biomed. Eng., 64 (9): 2186-2195 (2017)Forward-Secure Edge Authentication for Graphs., , , , , and . Comput. J., 65 (7): 1653-1665 (2022)Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption., , , and . J. Comput. Syst. Sci., (2017)ECG compression technique using fast fractals in the Internet of medical things., , , and . Concurr. Comput. Pract. Exp., (2023)Fully peer-to-peer virtual environments with 3D Voronoi diagrams., and . Computing, 94 (8-10): 679-700 (2012)An efficient and scalable privacy preserving algorithm for big data and data streams., , , , and . Comput. Secur., (2019)