Search
Add filters:
Use filters to refine the search results.
Results 1-4 of 4 (Search time: 0.003 seconds).
- previous
- 1
- next
Item hits:
Upload Date | Title | Researcher | Guide(s) |
---|---|---|---|
18-Dec-2022 | A Study of efficient and secure key distribution protocols for authentification in group communication environment | Ambika, S | Rajakumar, S |
6-Jan-2023 | An effective non commutative encryption approach with optimized genetic algorithm for ensuring data protection in cloud computing | Jerald Nirmal Kumar S | Ravimaran S |
18-Jan-2023 | Effective credential methods to mitigate the attacks in cloud environment using computational intelligence and block chain | Mayuranathan M | Murugan M |
29-Aug-2023 | Effective trust frame work and selection model for collaborated cloud computing service | Subashree, S | Chinnadurai, M |