Author of the publication

Improvised Model for Blockchain in Distributed Cloud Environment.

, , , , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 327-341. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis., , , , and . ICEA, page 38:1-38:6. ACM, (2020)Federated intelligence of anomaly detection agent in IoTMD-enabled Diabetes Management Control System., , , , , and . Future Gener. Comput. Syst., (2022)Low-Power AES Data Encryption Architecture for a LoRaWAN., , , , , and . IEEE Access, (2019)SMDFbs: Specification-Based Misbehavior Detection for False Base Stations., , , , , and . Sensors, 23 (23): 9504 (December 2023)A Formally Verified Security Scheme for Inter-gNB-DU Handover in 5G Vehicle-to-Everything., , , , , , and . IEEE Access, (2021)An Enhanced Group Key-Based Security Protocol to Protect 5G SON Against FBS., , , , , and . Comput. Syst. Sci. Eng., 45 (2): 1145-1165 (2023)Analyzing RRC Replay Attack and Securing Base Station with Practical Method., , , and . ARES, page 62:1-62:8. ACM, (2022)Improvised Model for Blockchain in Distributed Cloud Environment., , , , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 327-341. Springer, (2022)5G and beyond telco cloud: architecture and cybersecurity challenges., , , , , and . WAC, page 1-6. IEEE, (2021)