Author of the publication

A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing.

, , , , , , and . CloudCom, page 231-238. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Taxonomy Model for Cloud Computing Services., , , , , , and . CLOSER, page 56-65. SciTePress, (2011)Privacy-preserving linkage/revocation of VANET certificates without LAs., , , , , and . IACR Cryptology ePrint Archive, (2018)Revocation in Vehicular Public Key Infrastructures: Balancing privacy and efficiency., , , , and . Veh. Commun., (2021)Designing and Assessing Multi-tenant Isolation Strategies for Cloud Networks., , and . ICIN, page 214-221. IEEE, (2019)DVID: Adding Delegated Authentication to SPIFFE Trusted Domains., , , , , , , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 289-300. Springer, (2024)Tailoring two-dimensional codes for structured lattice-based KEMs and applications to Kyber., , , , and . IACR Cryptol. ePrint Arch., (2024)EbitSim: An Enhanced BitTorrent Simulation Using OMNeT++ 4., , , , , , and . MASCOTS, page 437-440. IEEE Computer Society, (2011)A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing., , , , , , and . CloudCom, page 231-238. IEEE Computer Society, (2011)Fast Additive Partially Homomorphic Encryption From the Approximate Common Divisor Problem., and . IEEE Trans. Inf. Forensics Secur., (2020)Survey and comparison of message authentication solutions on wireless sensor networks., , , , , and . Ad Hoc Networks, 11 (3): 1221-1236 (2013)