Author:
Vasan S. Keerthi,Jancy S.,Selvan Mercy Paul,Mary Viji Amutha
Reference24 articles.
1. S. Jancy, Discovering unpredictable changes in business process. J. Comput. Theor. Nanosci. 16(8), 3228–3231 (2019)
2. C.W.Q. Wang et al., Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)
3. D. Wagner, et al., Practical techniques for searches on encrypted data. in Proceeding 2000 IEEE Symposium on Security and Privacy (S&P, IEEE,2000)
4. Reza, et al., Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895–934 (2011)
5. R. Rayan, R. Ramalavanya, A survey on secure data offloading using auction based mechanism, in 2017 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC) (IEEE, 2017, March), pp. 335–341