Author of the publication

Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things.

, , , , and . COMPSAC, page 1237-1242. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A dynamic agreement framework for trading of wireless services., , , , , and . IEEE ANTS, page 67-72. IEEE, (2012)Secure and Energy Efficient Design of Multi-Modular Exponential Techniques for Public-Key Cryptosystem., , , , and . J. Commun. Inf. Networks, 7 (3): 309-323 (September 2022)Secure Deduplication with Dynamic Key Management in Fog Enabled Internet of Things., , , , and . COMPSAC, page 1237-1242. IEEE, (2023)Improving the performance of authentication protocols using efficient modular multi exponential technique., , , and . Multim. Tools Appl., 83 (4): 11061-11076 (January 2024)Efficient hardware realization and high radix implementation of modular multi exponential techniques for public key cryptography., , , and . Microelectron. J., (2022)Instrument Classification using image based Transfer Learning., , , and . ICCCS, page 1-5. IEEE, (2020)A Metric Reckon Algorithm for Bit Forwarding Techniques., , and . iSES, page 21-24. IEEE, (2019)Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography - Efficient Modular Exponential Techniques, , and . Springer, (2021)A Study to Determine the Effectiveness of Snake and Ladder Game on Knowledge of Common Ailments among Primary School Children of a Selected School Lucknow. INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT, 6 (7): 343-346 (January 2023)