Author of the publication

A Triggered Delay-based Approach against Cache Privacy Attack in NDN.

, , and . Int. J. Networked Distributed Comput., 6 (3): 174-184 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Intelligent Traffic Entropy Learning-Based Load Management Model for Cloud Networks., and . IEEE Netw. Lett., 4 (2): 59-63 (2022)NBP: Namespace-based privacy to counter timing-based attack in named data networking., , , and . J. Netw. Comput. Appl., (2019)A Differential Approach for Data and Classification Service based Privacy-Preserving Machine Learning Model in Cloud Environment., and . CoRR, (2022)A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions., and . CoRR, (2022)Efficient Methodologies to Determine the Relevancy of Hanging Pages Using Stability Analysis., , , and . Cybern. Syst., 47 (5): 376-391 (2016)Efficient Methodologies to Handle Hanging Pages Using Virtual Node., , and . Cybern. Syst., 42 (8): 621-635 (2011)A Triggered Delay-based Approach against Cache Privacy Attack in NDN., , and . Int. J. Networked Distributed Comput., 6 (3): 174-184 (2018)Correlation-based feature subset selection technique for web spam classification., and . Int. J. Web Eng. Technol., 13 (4): 363-379 (2018)Multiplicative filtering in the linear canonical transform domain., , , and . IET Signal Process., 10 (2): 173-181 (2016)A privacy-preserving model for cloud data storage through fog computing., and . Int. J. Comput. Aided Eng. Technol., 17 (3): 348-359 (2022)