Author of the publication

A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends.

, , , , , , , , and . Comput. Secur., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Convergence time analysis of OSPF routing protocol using social network metrics., , , , and . Future Gener. Comput. Syst., (2019)Dynamic Parameters-Based Reversible Data Transform (RDT) Algorithm in Recommendation System., , , , , , and . IEEE Access, (2021)Towards situational aware cyber-physical systems: A security-enhancing use case of blockchain-based digital twins., , , , , and . Comput. Ind., (2022)F-Classify: Fuzzy Rule Based Classification Method for Privacy Preservation of Multiple Sensitive Attributes., , , , , , , , and . Sensors, 21 (14): 4933 (2021)Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' Computers & Security 115 (2022)/102599., , , and . Comput. Secur., (2022)Trends and Challenges in Cloud Datacenters., , , and . IEEE Cloud Comput., 1 (1): 10-20 (2014)A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers., , , , , and . IEEE Trans. Cloud Comput., 9 (3): 845-853 (2021)FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network., , , , , , and . IEEE Internet Things J., 7 (7): 6132-6142 (2020)Towards enhanced threat modelling and analysis using a Markov Decision Process., , , and . Comput. Commun., (2022)A strong construction of S-box using Mandelbrot set an image encryption scheme., , , , , , and . PeerJ Comput. Sci., (2022)