Author of the publication

Cloud service recommendation based on trust measurement using ternary interval numbers.

, and . SMARTCOMP, page 21-24. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing., , , and . J. UCS, 19 (16): 2349-2367 (2013)Distributed Event-Triggered Trust Management for Wireless Sensor Networks., , , , and . IAS, page 291-294. IEEE Computer Society, (2009)Efficient verifiable fuzzy keyword search over encrypted data in cloud computing., , , , , , and . Comput. Sci. Inf. Syst., 10 (2): 667-684 (2013)Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems., , , , and . IEEE Access, (2019)A New Efficient Verifiable Fuzzy Keyword Search Scheme., , , , , , and . JoWUA, 3 (4): 61-71 (2012)PCA-derived respiratory motion surrogates from X-ray angiograms for percutaneous coronary interventions., , , , and . Int. J. Comput. Assist. Radiol. Surg., 10 (6): 695-705 (2015)Exploiting PUF Models for Error Free Response Generation., , , , , , , and . CoRR, (2017)PUF Sensor: Exploiting PUF Unreliability for Secure Wireless Sensing., , , and . IEEE Trans. on Circuits and Systems, 64-I (9): 2532-2543 (2017)A Novel Approach to Network Security Situation Assessment Based on Attack Confidence., , , , , , , and . NSS, volume 10394 of Lecture Notes in Computer Science, page 450-463. Springer, (2017)Analysis of Enterprise Workflow Solutions., , , , and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 680-687. Springer, (2009)