Author of the publication

A Secure Cloud Backup System with Deduplication and Assured Deletion.

, , , , and . ProvSec, volume 10592 of Lecture Notes in Computer Science, page 74-83. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Crowdsourcing: A Snapshot of Published Research., , , , , , , and . AMCIS, Association for Information Systems, (2013)Competitive Intelligence Practices in Small Business: a Social Media Analytics Approach., and . AMCIS, Association for Information Systems, (2016)Design and application of a PHEV simulation platform., , , and . ICSCA, page 277-280. ACM, (2017)Verifiable Range Query Processing for Cloud Computing., , , , and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 333-349. Springer, (2017)Bayesian information criterion for multidimensional sinusoidal order selection., , , and . ICASSP, page 3106-3110. IEEE, (2017)Physical layer security OFDM communication using phased array antenna., and . ICCC, page 1-4. IEEE, (2016)Build and Evaluate a Free Virtual Cluster on Amazon Elastic Compute Cloud for Scientific Computing., , and . Int. J. Online Eng., 13 (8): 121-132 (2017)Route Network Design of Community Shuttle for Metro Stations Through Genetic Algorithm Optimization., , , , and . IEEE Access, (2019)A New Design Paradigm for Enabling Smart Headphonse., , , , , , and . GetMobile Mob. Comput. Commun., 26 (3): 27-33 (2022)Vision Location Method for Key Features of the Metallurgical Machine with a Robot 3D Measurement System., , , , , and . CRC, page 109-116. IEEE, (2020)