Search

Your search keyword '"RAO, UDAI PRATAP"' showing total 35 results

Search Constraints

Start Over You searched for: Author "RAO, UDAI PRATAP" Remove constraint Author: "RAO, UDAI PRATAP" Database Complementary Index Remove constraint Database: Complementary Index
35 results on '"RAO, UDAI PRATAP"'

Search Results

1. Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing.

2. DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment.

3. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis.

4. PGASH: Provable group-based authentication scheme for Internet of Healthcare Things.

5. A transformative shift toward blockchain‐based IoT environments: Consensus, smart contracts, and future directions.

6. Secrecy aware key management scheme for Internet of Healthcare Things.

7. A review on cloud security issues and solutions.

8. Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare.

9. Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.

10. Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths.

11. Privacy‐preserving enhanced dummy‐generation technique for location‐based services.

12. A novel trust prediction approach for online social networks based on multifaceted feature similarity.

13. A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs).

14. An Interaction-Based and Graph-Based Hybrid Approach to Evaluate Trust in Online Social Networks (OSNs).

16. Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices.

17. EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things.

18. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case.

19. Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining.

20. Preserving location privacy using three layer RDV masking in geocoded published discrete point data.

21. VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services.

22. Towards privacy preserving unstructured big data publishing.

24. Privacy preserving big data publishing: a scalable k‐anonymization approach using MapReduce.

27. A Hybrid Location Privacy Solution for Mobile LBS.

31. Privacy preserving association rules in unsecured distributed environment using cryptography.

34. A Survey on Blockchain Consensus with a Performance Comparison of PoW, PoS and Pure PoS.

35. Privacy-preserving association rule mining for horizontally partitioned healthcare data: a case study on the heart diseases.

Catalog

Books, media, physical & digital resources