Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An IBE-based design for assured deletion in cloud storage., , , , and . Cryptologia, 43 (3): 254-265 (2019)Deep Learning Based Early Detection Framework for Preliminary Diagnosis of COVID-19 via Onboard Smartphone Sensors., , , , , , and . Sensors, 21 (20): 6853 (2021)A study of task scheduling algorithms in cloud computing., , , and . NISS (ACM), page 42:1-42:5. ACM, (2021)Big data emerging issues: Hadoop security and privacy., , , and . ICMCS, page 731-736. IEEE, (2016)New Model to Monitor Plant Growth Remotely using ESP32-CAM and Mobile Application., , and . WINCOM, page 1-6. IEEE, (2023)Big healthcare data: preserving security and privacy., , and . J. Big Data, (2018)A new service broker algorithm optimizing the cost and response time for cloud computing., , , and . ANT/EDI40, volume 151 of Procedia Computer Science, page 992-997. Elsevier, (2019)Security model for Big Healthcare Data Lifecycle., , , and . EUSPN/ICTH, volume 141 of Procedia Computer Science, page 294-301. Elsevier, (2018)Fog Computing for Smart Healthcare data Analytics: An Urgent Necessity., , and . NISS, page 42:1-42:5. ACM, (2020)Big data security and privacy in healthcare: A Review., , , and . EUSPN/ICTH, volume 113 of Procedia Computer Science, page 73-80. Elsevier, (2017)