Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Optimal Constraint Based Web Service Composition Using Intelligent Backtracking., and . J. Web Eng., 13 (5&6): 430-449 (2014)Reactive Network Monitor for DDoS Attacks., , , , and . BAIP, volume 70 of Communications in Computer and Information Science, page 349-355. Springer, (2010)A novel dual authentication protocol (DAP) for multi-owners in cloud computing., and . Clust. Comput., 20 (1): 507-523 (2017)ANOVEL APPROACH FOR HOTEL MANAGEMENT SYSTEM USING CASSANDRA, , and . (2017)An improved hybrid AI model for prediction of arrhythmia using ECG signals., and . Biomed. Signal Process. Control., 80 (Part): 104248 (2023)Blockchain and IoT Technology in Healthcare: A Review., and . MIE, volume 294 of Studies in Health Technology and Informatics, page 277-278. IOS Press, (2022)SLA with Dual Party Beneficiality in Distributed Cloud., , , and . ACC (1), volume 190 of Communications in Computer and Information Science, page 471-479. Springer, (2011)Enhanced Schmidt-Samoa cryptosystem for data confidentiality in cloud computing., and . IJISCM, 8 (2): 160-188 (2016)Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud., and . Clust. Comput., 21 (2): 1411-1437 (2018)Improving TCP Performance in Hybrid Networks., and . ACITY (1), volume 176 of Advances in Intelligent Systems and Computing, page 405-415. Springer, (2012)