Group by: Item Type | No Grouping
Number of items: 3.

Nagarani, C (2021) TRUST LEVEL EVALUATION BASED ASYMMETRIC CRYPTOGRAPHY PROTOCOL FOR FLEXIBLE ACCESS CONTROL IN FOG COMPUTING. International Journal of Computer Networks & Communications, 13 (3). pp. 109-121.

Nagarani, C (2021) TRUST LEVEL EVALUATION BASED ASYMMETRIC CRYPTOGRAPHY PROTOCOL FOR FLEXIBLE ACCESS CONTROL IN FOG COMPUTING. International Journal of Computer Networks & Communications, 13 (3). pp. 109-121.

Nagarani, C and Kousalya, R (2019) Round Trip Latency Based Authentication Scheme in Fog-Enabled Cloud Computing System. International Journal of Recent Technology and Engineering, 8 (2). ISSN 2277-3878

This list was generated on Tue Apr 16 11:13:57 2024 UTC.