Author of the publication

Two Factor Authentication using M-pin Server for Secure Cloud Computing Environment.

, and . Int. J. Cloud Appl. Comput., 4 (4): 42-54 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A mixed opinion-based reputation prediction approach for reliable web service discovery., and . Int. J. Bus. Inf. Syst., 22 (2): 143-165 (2016)Comparative study and analysis of web personalization frameworks of recommender systems for e-commerce., and . CUBE, page 629-634. ACM, (2012)An empirical study to design an effective agile project management framework., and . CUBE, page 385-390. ACM, (2012)Analyzing Virtualization Vulnerabilities and Design a Secure Cloud Environment to Prevent from XSS Attack., and . Int. J. Cloud Appl. Comput., 6 (1): 1-14 (2016)Two Factor Authentication using M-pin Server for Secure Cloud Computing Environment., and . Int. J. Cloud Appl. Comput., 4 (4): 42-54 (2014)A Survey on Mobile App Development Approaches With the Industry Perspective., and . Int. J. Open Source Softw. Process., 13 (1): 1-17 (2022)Phase wise effort estimation for software maintenance: an extended SMEEM model., and . CUBE, page 397-402. ACM, (2012)Tailoring for agile methodologies: a framework for sustaining quality and productivity., and . Int. J. Bus. Inf. Syst., 23 (4): 432-455 (2016)An Empirical Evaluation of Iterative Maintenance Life Cycle Using XP., and . ACM SIGSOFT Softw. Eng. Notes, 40 (2): 1-14 (2015)A Project Management Framework for Global Software Development., and . ACM SIGSOFT Softw. Eng. Notes, 43 (1): 1-10 (2018)