Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimised Privacy Model for Cloud Data., , , and . ICCSE, page 267-269. IEEE, (2021)A Two-Layer Image-Steganography System for Covert Communication Over Enterprise Network., , and . ICCSA (6), volume 12254 of Lecture Notes in Computer Science, page 459-470. Springer, (2020)Post-quantum cryptography-driven security framework for cloud computing., , , and . Open Comput. Sci., 12 (1): 142-153 (2022)Contact Tracing Strategies for COVID-19 Prevention and Containment: A Scoping Review., , , , , , , , , and 3 other author(s). Big Data Cogn. Comput., 6 (4): 111 (2022)Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography., , , and . ICITST, page 449-452. IEEE, (2013)Development of an Audio Steganography System Using Discrete Cosine Transform and Spread Spectrum Techniques., , and . ICCSA (6), volume 12254 of Lecture Notes in Computer Science, page 412-427. Springer, (2020)Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography., , , and . ICITST, page 449-452. IEEE, (2013)Transformation technique for derivation of similarity scores for signatures., , and . Iran J. Comput. Sci., 5 (4): 317-328 (2022)Post-Quantum Crystography System for Secure Electronic Voting., , , , and . Open Comput. Sci., 9 (1): 292-298 (2019)