Author of the publication

Hierarchical group key management for secure data sharing in a cloud-based environment.

, , , and . Concurr. Comput. Pract. Exp., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Error Detection and Correction for Distributed Group Key Agreement Protocol, , and . CoRR, (2011)Test Suite Reduction Using HGS Based Heuristic Approach., , , and . Comput. Informatics, 34 (5): 1113-1132 (2015)An Efficient Information System for Providing Location Based Services in Network Environments., and . Wirel. Pers. Commun., 109 (4): 2377-2398 (2019)REFERS: refined and effective fuzzy e-commerce recommendation system., , and . Int. J. Bus. Intell. Data Min., 17 (1): 117-137 (2020)Neural network classifier optimization using Differential Evolution with Global Information and Back Propagation algorithm for clinical datasets., , and . Appl. Soft Comput., (2016)Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System., and . ADBIS, volume 3255 of Lecture Notes in Computer Science, page 393-408. Springer, (2004)Imputing missing values in unevenly spaced clinical time series data to build an effective temporal classification framework., , and . Comput. Stat. Data Anal., (2017)Content Based Compression for Quicx System., , and . ACC (2), volume 191 of Communications in Computer and Information Science, page 19-29. Springer, (2011)Protection of Web Applications from Cross-Site Scripting Attacks in Browser Side, , and . CoRR, (2010)A Comprehensive Analysis of Congestion Control Models in Wireless Sensor Networks., , , and . Int. J. Strateg. Inf. Technol. Appl., 9 (4): 15-37 (2018)