Author of the publication

Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability.

, , , , and . J. Cloud Comput., 13 (1): 45 (December 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancement of Unsupervised Object Detection using Supervised Method., , and . ICCCNT, page 1-9. IEEE, (2020)Backoff Algorithm in Cognitive Radio MAC Protocol for Throughput Enhancement., and . IEEE Trans. Vehicular Technology, 64 (5): 1991-2000 (2015)Design and performance analysis of double-gate MOSFET over single-gate MOSFET for RF switch., , and . Microelectron. J., 42 (3): 527-534 (2011)Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability., , , , and . J. Cloud Comput., 13 (1): 45 (December 2024)Terahertz Data Extraction and Analysis Based on Deep Learning Techniques for Emerging Applications., and . IEEE Access, (2024)Terahertz Imaging and Sensing for Healthcare: Current Status and Future Perspectives., and . IEEE Access, (2023)Spectrum mobility in cognitive radio network using spectrum prediction and monitoring techniques., , , , and . Phys. Commun., (2017)Use of Reconfigurable IM Regions to Suppress Propagation and Polarization Dependent Losses in a MMI Switch., , and . Int. J. Comput. Commun. Control, 7 (4): 767-775 (2012)Throughput maximization with reduced data loss rate in cognitive radio network., and . Telecommun. Syst., 57 (2): 209-215 (2014)Energy and spectral efficient SMC-MAC protocol in distributed cognitive radio networks., and . IET Commun., 13 (17): 2705-2713 (2019)