Your selections:
Countering stasistical attacks in cloud-based searchable encryption
- Ahsan, M., Ali, Ihsan, Bin Idris, Mohd, Imran, Muhammad, Shoaib, Muhammad
Perception layer security in internet of things
- Khattak, Hasan, Shah, Munam, Khan, Sangeen, Ali, Ihsan, Imran, Muhammad
Are you sure you would like to clear your session, including search history and login status?