Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security issues in MANET: A review., , and . WOCN, page 1-4. IEEE, (2010)Secure Multi-Party Computation for statistical computations using virtual parties on a Token Ring Network., , , and . WOCN, page 1-6. IEEE, (2010)A BigData approach for sentiment analysis of twitter data using Naive Bayes and SVM Algorithm., , and . WOCN, page 1-6. IEEE, (2019)Key Issues of Security and Integrity in Third Party Association Rule Mining., , , and . ICETET, page 337-340. IEEE Computer Society, (2009)Changing Neighbors k Secure Sum Protocol for Secure Multi Party Computation, , and . CoRR, (2010)Simulation of Collision Resistant Secure Sum Protocol., , and . CoRR, (2014)Strategic Game theory models and commercialization for Nano RFID systems., , , and . WOCN, page 1-5. IEEE, (2010)A Method for Load Balancing and Energy Optimization in Cloud Computing Virtual Machine Scheduling., , and . UKCI, volume 1453 of Advances in Intelligent Systems and Computing, page 325-335. Springer, (2023)Congestion Control during Data Privacy in Secure Multiparty Computation., , , , and . ICETET, page 330-332. IEEE Computer Society, (2009)Electronic Data Interchange: A Review., , , and . CICSyN, page 323-327. IEEE Computer Society, (2011)