Author of the publication

Transient Time Analysis of Network Security Survivability Using DEVS.

, and . AIS, volume 3397 of Lecture Notes in Computer Science, page 607-616. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security-Aware Data Placement Mechanism for Big Data Cloud Storage Systems., , and . BigDataSecurity/HPSC/IDS, page 327-332. IEEE, (2016)Revisiting the Design of Parallel Stream Joins on Trusted Execution Environments., , , and . Algorithms, 15 (6): 183 (2022)Homomorphic Comparison for Point Numbers with User-Controllable Precision and Its Applications., , , , and . Symmetry, 12 (5): 788 (2020)A study of secure DBaaS with encrypted data transactions., , and . ICCIP, page 43-47. ACM, (2016)Differentiated Ethernet Congestion Management for Prioritized Traffic., , and . ICC, page 1-5. IEEE, (2010)High-Performance FV Somewhat Homomorphic Encryption on GPUs: An Implementation using CUDA., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 70-95 (2018)Virtual machine placement with two-path traffic routing for reduced congestion in data center networks., , , , and . Comput. Commun., (2014)SELDAC: Software-Defined Storage based Efficient Load Distribution and Auto Scaling in Cloud Data Centers., and . J. Commun., 10 (12): 1020-1026 (2015)Scheduling Multiple Divisible Loads in a Multi-cloud System., , and . UCC, page 371-378. IEEE Computer Society, (2014)Building a Robust and Efficient Middleware for Geo-replicated Storage Systems., , , and . ICCCRI, page 148-155. IEEE Computer Society, (2015)