Author of the publication

Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.

, , , , and . J. Supercomput., 66 (3): 1687-1706 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing., , , , and . J. Supercomput., 66 (3): 1687-1706 (2013)Towards a Complete Set of Gym Exercises Detection Using Smartphone Sensors., , , , , , , and . Sci. Program., (2020)Introducing ToPe-FFT: An OpenCL-based FFT library targeting GPUs., , , , , and . Concurr. Comput. Pract. Exp., (2017)Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques., , , and . IEEE Access, (2024)A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach., , , , and . J. Grid Comput., 13 (4): 651-675 (2015)Computation Offloading Cost Estimation in Mobile Cloud Application Models., , , , and . Wirel. Pers. Commun., 97 (3): 4897-4920 (2017)Context-Aware Mobile Cloud Computing and Its Challenges., , , and . IEEE Cloud Comput., 2 (3): 42-49 (2015)Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems., , , , , and . Comput. Syst. Sci. Eng., (2017)Framework for Ubiquitous Social Networks., , , and . CoRR, (2013)Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks., , , , , , and . J. Netw. Comput. Appl., (2014)