Author of the publication

An Automated Methodology for Secured User Allocation in Cloud.

, , and . SSCC, volume 625 of Communications in Computer and Information Science, page 137-151. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-phase watermark for IP core protection., and . ICCE, page 1-3. IEEE, (2018)Designing Low-Cost Hardware Accelerators for CE Devices Hardware Matters., , , and . IEEE Consumer Electronics Magazine, 6 (4): 140-149 (2017)Low Cost Dual-Phase Watermark for Protecting CE Devices in IoT Framework., and . Security and Fault Tolerance in Internet of Things, Springer, (2019)Robust Digital Signature to Protect IP Core against Fraudulent Ownership and Cloning., , and . ICCE-Berlin, page 1-3. IEEE, (2019)A Formal Methodology for Modeling Threats to Enterprise Assets., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 149-166. Springer, (2014)User power-delay budget driven PSO based design space exploration of optimal k-cycle transient fault secured datapath during high level synthesis., and . ISQED, page 289-292. IEEE, (2015)Secure Information Processing during System-Level: Exploration of an Optimized Trojan Secured Datapath for CDFGs during HLS Based on User Constraints., and . iNIS, page 1-6. IEEE, (2015)Signature Biometric based Authentication of IP Cores for Secure Electronic Systems., and . iSES, page 384-388. IEEE, (2021)Audio and Video Technologies: Recent Advances in Consumer Electronics., and . IEEE Consumer Electron. Mag., 7 (5): 26 (2018)A Quantitative Methodology for Cloud Security Risk Assessment., , and . CLOSER, page 92-103. SciTePress, (2017)