Author of the publication

A Secure Architecture for Data Storage in the Cloud Environments.

, , , and . IMIS, page 289-291. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

HyperSIGMA: Hyperspectral Intelligence Comprehension Foundation Model., , , , , , , , , and 12 other author(s). CoRR, (2024)General Multi-key Searchable Encryption., , , , , and . AINA Workshops, page 89-95. IEEE Computer Society, (2015)A Data Mining Approach to Customer Segment Based on Customer Value., , and . FSKD (4), page 513-517. IEEE Computer Society, (2008)978-0-7695-3305-6.A Mutation Approach of Detecting SQL Injection Vulnerabilities., , , , , , and . ICCCS (2), volume 10603 of Lecture Notes in Computer Science, page 175-188. Springer, (2017)The Research on Customer Lifetime Value in Multi-agent Artificial Market., and . FSKD (5), page 489-494. IEEE Computer Society, (2008)978-0-7695-3305-6.Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud., , , , and . Trans. Comput. Collect. Intell., (2015)Hyperspectral image compression based on multiple priors., , and . J. Frankl. Inst., 361 (14): 107056 (2024)A Secure Architecture for Data Storage in the Cloud Environments., , , and . IMIS, page 289-291. IEEE Computer Society, (2015)Building a Large Scale Wireless Sensor Network for the Industrial Environment., , and . RTCSA, page 96. IEEE Computer Society, (2016)Hybrid-context-based multi-prior entropy modeling for learned lossless image compression., , and . Pattern Recognit., (2024)