Author of the publication

Enabling secure location-based services in mobile cloud computing.

, , , and . MCC@SIGCOMM, page 27-32. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simplified Local Internet Number Resource Management with the RPKI (SLURM)., , and . RFC, (August 2018)Lecture video indexing using boosted margin maximizing neural networks., , , and . CoRR, (2017)Efficient and secure encryption schemes for JPEG2000., and . ICASSP (5), page 869-872. IEEE, (2004)Lecture Vdeo Indexing Using Boosted Margin Maximizing Neural Networks., , , and . ICMLA, page 221-227. IEEE, (2017)Wireless medical implant: A case study on artificial pancreas., , , , , and . ICC, page 6096-6100. IEEE, (2012)Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens., , , and . IEEE Trans. Reliability, 68 (4): 1330-1346 (2019)CGMOS: Certainty Guided Minority OverSampling., , , , and . CIKM, page 1623-1631. ACM, (2016)A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks., , , , and . IEEE Access, (2020)A Physical and SPICE-Compatible Model for the MOS Depletion Device.. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 4 (3): 349-356 (1985)Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing., , , , , and . IEEE Internet Things J., 11 (2): 1893-1909 (January 2024)