From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protecting medical data in cloud storage using fault-tolerance mechanism., , и . ICSDE, стр. 214-219. ACM, (2017)A Secured Data Processing Technique for Effective Utilization of Cloud Computing., , и . J. Data Min. Digit. Humanit., (2018)A Cloud-based Framework to Secure Medical Image Processing., , и . J. Mobile Multimedia, 14 (3): 319-344 (2018)Security in Cloud-Based Medical Image Processing: Requirements and Approaches., , и . BDCA, стр. 6:1-6:6. ACM, (2017)Applying OM-AM Reference to an ABAC Model for Securing Cloud-Enabled Internet of Things., , и . ICSRS, стр. 86-91. IEEE, (2018)Applying homomorphic encryption for securing cloud database., , и . CIST, стр. 658-664. IEEE, (2016)Game theoretical approach for a fair and effective pricing strategy in cloud computing., , , и . Int. J. High Perform. Syst. Archit., 10 (1): 43-55 (2021)Towards a secure cloud database using Paillier's homomorphic cryptosystem., , и . ICMCS, стр. 360-365. IEEE, (2016)Using Homomorphic Encryption in Cloud-Based Medical Image Processing: Opportunities and Challenges., , и . SCA, том 37 из Lecture Notes in Networks and Systems, стр. 824-835. Springer, (2017)Simplified and Efficient Framework for Securing Medical Image Processing Over Cloud Computing., , и . SCA, том 37 из Lecture Notes in Networks and Systems, стр. 789-802. Springer, (2017)