Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Trust Computing Model for Future Generation Networks., and . ICCCNT, page 1-4. IEEE, (2020)Investigation on storage level data integrity strategies in cloud computing: classification, security obstructions, challenges and vulnerability., , , , and . J. Cloud Comput., 13 (1): 45 (December 2024)Study of phase transitions in a bent-core liquid crystal probed by infrared spectroscopy, , , , , , , and . VIBRATIONAL SPECTROSCOPY, (2016)Large universe attribute based encryption enabled secured data access control for cloud storage with computation outsourcing., and . Multiagent Grid Syst., 15 (2): 99-119 (2019)Efficient and scalable outsourced data access control with user revocation in cloud: A comprehensive study., and . Multiagent Grid Syst., 14 (4): 383-401 (2018)Privacy preserved secured outsourced cloud data access control scheme with efficient multi-authority attribute based signcryption., , and . Multiagent Grid Syst., 16 (4): 409-432 (2020)Path planning of mobile robot with neuro-fuzzy technique., , and . ISDA, page 149-154. IEEE, (2012)Path planning of mobile robot with neuro-genetic-fuzzy technique in static environment., , and . Int. J. Hybrid Intell. Syst., 11 (2): 71-80 (2014)ZSS Signature-Based Audit Message Verification Process for Cloud Data Integrity., , , , and . IEEE Access, (2023)Analysis of Post centric suicidal expressions and classification on the Social Media Post: Twitter., , and . ICCCNT, page 1-5. IEEE, (2020)