Author of the publication

Performability evaluation of transport modes for cloud-based inbound logistics: a study based on coffee industry.

, , , , and . Int. J. Manuf. Technol. Manag., 34 (2): 126-147 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transport mode assessment for inbound logistics: A study based on coffee industry., , , , and . SMC, page 1318-1323. IEEE, (2014)A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM., , , , and . IACR Cryptology ePrint Archive, (2017)Performability evaluation of transport modes for cloud-based inbound logistics: a study based on coffee industry., , , , and . Int. J. Manuf. Technol. Manag., 34 (2): 126-147 (2020)Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model., , , and . IACR Cryptology ePrint Archive, (2009)Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation., , , , , , and . IACR Cryptology ePrint Archive, (2016)Information-Theoretically Secure String Commitments Based on Packet Reordering Channels., , , and . IEEE Access, (2021)An information theoretical model for quantum secret sharing., , , , and . Quantum Inf. Comput., 5 (1): 69-80 (2005)Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra., , , , , and . IEEE Trans. Inf. Forensics Secur., 11 (1): 59-73 (2016)Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy., , , and . IACR Cryptol. ePrint Arch., (2021)Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines., , and . IACR Cryptol. ePrint Arch., (2021)