Author of the publication

Ranking based search in the encrypted cloud environment

, and . International Journal on Recent and Innovation Trends in Computing and Communication, 3 (2): 842--844 (February 2015)
DOI: 10.17762/ijritcc2321-8169.150289

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impulsive effects on Clifford-valued neural networks with time-varying delays: An asymptotic stability analysis., , , and . Appl. Math. Comput., (2021)Design of an Abstraction Layer for Communication with BOSH XMPP Server., and . ACM SIGSOFT Softw. Eng. Notes, 40 (2): 1-4 (2015)Ranking based search in the encrypted cloud environment, and . International Journal on Recent and Innovation Trends in Computing and Communication, 3 (2): 842--844 (February 2015)Analysis of non-Markovian batch arrival queueing model with multi stages of service of restricted admissibility, feedback service and three optional vacations in production and manufacturing., , and . Int. J. Math. Oper. Res., 11 (3): 285-309 (2017)An investigation on MX/G/1 queuing model of interrupted services in the manufacturing of edible cutlery process., , , and . Int. J. Math. Model. Numer. Optimisation, 13 (2): 173-201 (2023)A dynamic assertion-based verification platform for UML statecharts over rhapsody, , , , , , and . TENCON 2008 - 2008, TENCON 2008. IEEE Region 10 Conference, page 1--6. (2008)Hardware Accelerator for Dual Standard Deblocking Filter., , , and . VLSID, page 210-215. IEEE, (2021)SignPose: Sign Language Animation Through 3D Pose Lifting., , and . ICCVW, page 2640-2649. IEEE, (2021)Modern Framework for Distributed Healthcare Data Analytics Based on Hadoop., and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 348-355. Springer, (2014)Classifying the malware application in the Android-based smart phones using ensemble-ANFIS algorithm., and . Int. J. Netw. Virtual Organisations, 19 (2/3/4): 257-269 (2018)