Group by: Item Type | No Grouping
Jump to: Article
Number of items: 3.

Article

Nagarani, C (2021) TRUST LEVEL EVALUATION BASED ASYMMETRIC CRYPTOGRAPHY PROTOCOL FOR FLEXIBLE ACCESS CONTROL IN FOG COMPUTING. International Journal of Computer Networks & Communications, 13 (3). pp. 109-121.

Nagarani, C (2021) TRUST LEVEL EVALUATION BASED ASYMMETRIC CRYPTOGRAPHY PROTOCOL FOR FLEXIBLE ACCESS CONTROL IN FOG COMPUTING. International Journal of Computer Networks & Communications, 13 (3). pp. 109-121.

Nagarani, C and Kousalya, R (2019) Round Trip Latency Based Authentication Scheme in Fog-Enabled Cloud Computing System. International Journal of Recent Technology and Engineering, 8 (2). ISSN 2277-3878

This list was generated on Tue Jan 31 17:14:24 2023 UTC.