Author of the publication

A Simple Technique for Securing Data at Rest Stored in a Computing Cloud.

, , , , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 553-558. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An image block encryption algorithm based on hyperchaotic system and DNA encoding., , , , and . Multim. Tools Appl., 81 (12): 17245-17262 (2022)MEMG: Mobile Encrypted Traffic Classification With Markov Chains and Graph Neural Network., , , , , and . HPCC/DSS/SmartCity/DependSys, page 478-486. IEEE, (2021)A Simple Technique for Securing Data at Rest Stored in a Computing Cloud., , , , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 553-558. Springer, (2009)A comprehensive benchmarking of differential splicing tools for RNA-seq analysis at the event level., , , , and . Briefings Bioinform., (May 2023)DryVR 2.0: A tool for verification and controller synthesis of black-box cyber-physical systems., , , and . HSCC, page 269-270. ACM, (2018)JumpEstimate: a Novel Black-box Countermeasure to Website Fingerprint Attack Based on Decision-boundary Confusion., , , , , and . ISCC, page 1-7. IEEE, (2020)0.7-6 GHz Programable Gain Push-Pull Driver PA Based on Dual-Loop Biases., , , , and . APCCAS, page 213-216. IEEE, (2022)Online Encrypted Mobile Application Traffic Classification at the Early Stage: Challenges, Evaluation Criteria, Comparison Methods., , , , and . ICCCS, page 1128-1135. IEEE, (2021)CyPhyHouse: A Programming, Simulation, and Deployment Toolchain for Heterogeneous Distributed Coordination., , , , , , , , and . CoRR, (2019)Zero-relabelling mobile-app identification over drifted encrypted network traffic., , , , , and . Comput. Networks, (June 2023)