Author of the publication

Trust management scheme for authentication in secure cloud computing using double encryption method.

, and . Int. J. Bus. Intell. Data Min., 15 (1): 49-70 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal PFC corrector of single stage power converter using BC tuned PID controller., and . J. Intell. Fuzzy Syst., 30 (6): 3155-3166 (2016)Improving map reduce task scheduling and micro-partitioning mechanism for mobile cloud multimedia services., and . Int. J. Adv. Intell. Paradigms, 8 (2): 156-167 (2016)Comments on 'Improved delay-dependent stability criteria for continuous systems with two additive time-varying delay components'., , and . Commun. Nonlinear Sci. Numer. Simul., 24 (Issues): 1-3 (2015)Trust management scheme for authentication in secure cloud computing using double encryption method., and . Int. J. Bus. Intell. Data Min., 15 (1): 49-70 (2019)Privacy preserving of intermediate dataset using hybridisation of oppositional gravitational search algorithm and elliptic curve cryptography., and . Int. J. Bus. Inf. Syst., 31 (2): 265-281 (2019)A strategic performance of virtual task scheduling in multi cloud environment., and . Clust. Comput., 22 (Supplement): 9589-9597 (2019)A case study on evaluating the benefits of MPLS traffic engineering through constraint-based routing and network controls., , , , , , , and . ICC, page 2437-2442. IEEE, (2002)Chromatic partitions of a graph., and . Discret. Math., 74 (1-2): 227-239 (1989)Thermal Transport Properties Analysis of MWCNT-RT21Nanofluids. International Journal of Trend in Scientific Research and Development, 3 (2): 641-643 (February 2019)