Author of the publication

A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing.

, , and . CSS, volume 8300 of Lecture Notes in Computer Science, page 387-402. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Superior Prosthetic Member Based on Assistive Technologies., , , , , and . iSCI, volume 1122 of Communications in Computer and Information Science, page 520-530. Springer, (2019)Guest editorial: Trusted computing and communications., , and . Secur. Commun. Networks, 4 (1): 1-2 (2011)A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 2 (1): 3-12 (2018)A ZigBee-based elderly health monitoring system: design and implementation., , and . Int. J. Auton. Adapt. Commun. Syst., 7 (4): 393-411 (2014)Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks., , , and . IEEE Trans. Parallel Distributed Syst., 25 (4): 939-949 (2014)Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 207-218. Springer, (2005)Hole Avoiding in Advance Routing with Hole Recovery Mechanism in Wireless Sensor Networks., , , , and . Ad Hoc Sens. Wirel. Networks, 16 (1-3): 191-138 (2012)An efficient spatial query processing algorithm in multi-sink wireless sensor networks., , , and . Int. J. Sens. Networks, 22 (4): 274-282 (2016)Node-Disjoint Multipath Routing with Zoning Method in MANETs., , , and . HPCC, page 456-462. IEEE Computer Society, (2008)Analysis of channel allocation scheme for wireless cellular networks., , , and . Int. J. Ad Hoc Ubiquitous Comput., 4 (3/4): 201-209 (2009)