1 |
S. S. Sarkar, M. Dabra, S. Jain, I. Channa and R. Sharda, "Predicting Evapotranspiration (ETo) by Training Regression Models," 2022 IEEE IAS Global Conference on Emerging Technologies (GlobConET), Arad, Romania, 2022, pp. 621-626, doi: 10.1109/GlobConET53749.2022.9872347. |
2 |
Mamta, B. B. Gupta, John Chui Kwok Tai and Konstantinos Psannis, “Metadata Security Measures for Protecting Confidential Information on the Cloud,” 9th International Conference on Computational Data and Social Networks Dec 11-13, Dallas, TX., pp. 398-410, https://doi.org/10.1007/978-3-030-66046-8_33. |
3 |
Mamta and B. B. Gupta, “Secure Fine-Grained Multi-Keyword Search with Protection from Key Abusers in the Cloud,” 8th Global Conference on Consumer Electronics 2019 (GCCE), pp. 679-683, doi:10.1109/GCCE46687.2019.9015302. |
4 |
Mamta, B. B. Gupta and Syed Taqi Ali, “ISEkFT: An IBE-Based Searchable Encryption Scheme with k-Keyword Fuzzy Search Trapdoor,” Journal of Information Technology Research (JITR), 12(3), pp. 133-153, 2019. (Scopus) |
5 |
Mamta, B. B. Gupta and Syed Taqi Ali, “Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search,” International Journal of E-Services and Mobile Applications (IJESMA), 11(4), pp. 16-38, 2019. (Scopus) |