Search

Your search keyword '"Rao, Udai Pratap"' showing total 22 results

Search Constraints

Start Over You searched for: Author "Rao, Udai Pratap" Remove constraint Author: "Rao, Udai Pratap" Publisher springer nature Remove constraint Publisher: springer nature
22 results on '"Rao, Udai Pratap"'

Search Results

1. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment.

2. Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing.

3. DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment.

4. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis.

5. PGASH: Provable group-based authentication scheme for Internet of Healthcare Things.

6. Secrecy aware key management scheme for Internet of Healthcare Things.

7. Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare.

8. Impact Analysis of Rank Attack on RPL-Based 6LoWPAN Networks in Internet of Things and Aftermaths.

9. A novel trust prediction approach for online social networks based on multifaceted feature similarity.

10. A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs).

11. An Interaction-Based and Graph-Based Hybrid Approach to Evaluate Trust in Online Social Networks (OSNs).

13. Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices.

14. EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things.

15. A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case.

16. Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining.

17. Preserving location privacy using three layer RDV masking in geocoded published discrete point data.

18. VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services.

21. Privacy-preserving association rule mining for horizontally partitioned healthcare data: a case study on the heart diseases.

22. Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study.

Catalog

Books, media, physical & digital resources