Author of the publication

Confinement forest-based enhanced min-min and max-min technique for secure multicloud task scheduling.

, , and . Trans. Emerg. Telecommun. Technol., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence-based secure ad-hoc on-demand distance vector algorithm., and . IET Wirel. Sens. Syst., 13 (6): 201-215 (December 2023)A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept., , , and . Sustain. Comput. Informatics Syst., (2019)Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks., and . Int. J. Commun. Networks Distributed Syst., 21 (2): 157-186 (2018)Implementation of round robin policy in DNS for thresholding of distributed web server system., , and . ICWET, page 198-201. ACM, (2011)Task allocation in distributed database system design., , and . ICWET, page 1018. ACM, (2010)A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks., and . Wireless Networks, 23 (8): 2455-2472 (2017)Confinement forest-based enhanced min-min and max-min technique for secure multicloud task scheduling., , and . Trans. Emerg. Telecommun. Technol., (2022)A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks., and . Int. J. Commun. Networks Distributed Syst., 24 (1): 23-57 (2020)Quasi-identifier recognition with echo chamber optimization-based anonymization for privacy preservation of cloud storage., and . Concurr. Comput. Pract. Exp., (2024)