Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An improved security and privacy management system for data in multi-cloud environments using a hybrid approach., , and . Evol. Intell., 14 (2): 1117-1133 (2021)l-PEES-IMP: lightweight proxy re-encryption-based identity management protocol for enhancing privacy over multi-cloud environment., , and . Autom. Softw. Eng., 29 (1): 4 (2022)Secure information dispatch through assailant distraction by cheating text., , and . WOCN, page 1-5. IEEE, (2015)Ensuring Privacy Preservation for Various Plants Multi-product Disease Detection and Pesticides Recommendation Data Using Inception V3., , , and . SN Comput. Sci., 5 (1): 6 (January 2024)Multimedia Concealed Data Detection Using Quantitative Steganalysis., , and . Int. J. Digit. Crime Forensics, 13 (5): 101-113 (2021)Privacy preservation of ROI of medical image using squint pixel and PLSB hiding technique.. VSMM, page 1-5. IEEE, (2016)Message Encryption Scheme Using Cheating Text., and . ITNG, page 470-474. IEEE Computer Society, (2009)Securing Multimedia Using a Deep Learning Based Chaotic Logistic Map., , , , and . IEEE J. Biomed. Health Informatics, 27 (3): 1154-1162 (March 2023)Security and privacy of UAV data using blockchain technology., , , , and . J. Inf. Secur. Appl., (2020)Novel secure data protection scheme using Martino homomorphic encryption., , and . J. Cloud Comput., 12 (1): 47 (December 2023)