Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

E3C: A Tool for Evaluating Communication and Computation Costs in Authentication and Key Exchange Protocol., , and . CoRR, (2022)LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation., and . Complex., (2021)SOS-FCI: a secure offloading scheme in fog-cloud-based IoT., , and . J. Supercomput., 80 (1): 570-600 (January 2024)Energy-Efficient and delay-guaranteed computation offloading for fog-based IoT networks., , , and . Comput. Networks, (2020)Kullback-Leibler distance criterion consolidation in cloud., , and . J. Netw. Comput. Appl., (2020)An autonomous model for self-optimizing virtual machine selection by learning automata in cloud environment., , and . Softw. Pract. Exp., 51 (6): 1352-1386 (2021)Burst-aware virtual machine migration for improving performance in the cloud., and . Int. J. Commun. Syst., (2020)SCTTS: Scalable Cost-Time Trade-off Scheduling for Workflow Application in Grids., , and . KSII Trans. Internet Inf. Syst., 7 (12): 3096-3117 (2013)Provisioning-Based Resource Management for Effective Workflow Scheduling on Utility Grids., , and . CCGRID, page 719-720. IEEE Computer Society, (2012)Burstiness-aware virtual machine placement in cloud computing systems., , and . J. Supercomput., 76 (1): 362-387 (2020)