Author of the publication

Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.

, , , , and . J. Supercomput., 66 (3): 1687-1706 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A traffic flow-oriented routing protocol for VANETs., , , , and . EURASIP J. Wireless Comm. and Networking, (2014)Towards secure mobile cloud computing: A survey., , , and . Future Gener. Comput. Syst., 29 (5): 1278-1299 (2013)A Qualitative Comparison of MPSoC Mobile and Embedded Virtualization Techniques., , and . CoRR, (2016)Incremental proxy re-encryption scheme for mobile cloud computing environment., , , , , and . J. Supercomput., 68 (2): 624-651 (2014)A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb., , , , and . IEEE Communications Letters, 24 (4): 744-747 (2020)Stable-path multi-channel routing with extended level channel assignment., , , , and . Int. J. Commun. Syst., 25 (7): 887-902 (2012)A comparative study of location-based recommendation systems., , and . Knowl. Eng. Rev., (2017)Resource management in cloud computing: Taxonomy, prospects, and challenges., , , , and . Comput. Electr. Eng., (2015)Diet-Right: A Smart Food Recommendation System., , , , , and . KSII Trans. Internet Inf. Syst., 11 (6): 2910-2925 (2017)Object Recognition Using Simulated Evolution on Fourier Descriptors., , , and . WSC, volume 75 of Advances in Intelligent and Soft Computing, page 205-213. Springer, (2009)