Author of the publication

Comparitive Study on Secure Data Retrieval Framework for Military Networks

, and . International Journal on Recent and Innovation Trends in Computing and Communication, 3 (4): 2072--2075 (April 2015)
DOI: 10.17762/ijritcc2321-8169.150467

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Pattern Matching Model for Misuse Intrusion Detection, and . Proceedings of the 17th National Computer Security Conference, page 11--21. (1994)An Application of Pattern Matching in Intrusion Detection, and . (1994)District-wise Growth of Population in Western Himalayan States of India, 1981-2011, and . SCIENCE PARK, (August 2013)Revocable Identity-Based Encryption from Codes with Rank Metric., , , and . CT-RSA, volume 10808 of Lecture Notes in Computer Science, page 435-451. Springer, (2018)Design and Implementation of Modified Fuzzy based CPU Scheduling Algorithm., , and . CoRR, (2017)A Unified Framework for Structured Graph Learning via Spectral Constraints., , , and . CoRR, (2019)Distributed interference alignment for MIMO cellular network via consensus ADMM., and . GlobalSIP, page 460-464. IEEE, (2016)Velocity-assisted multidimensional scaling., and . SPAWC, page 570-574. IEEE, (2015)PIRSF: family classification system at the Protein Information Resource., , , , , , , , , and 10 other author(s). Nucleic Acids Res., 32 (Database-Issue): 112-114 (2004)Distinct position-specific sequence features of hexa-peptides that form amyloid-fibrils: application to discriminate between amyloid fibril and amorphous β-aggregate forming peptide sequences., , , and . BMC Bioinform., 14 (S-8): S6 (2013)