Author of the publication

WORAL: A Witness Oriented Secure Location Provenance Framework for Mobile Devices.

, , , and . IEEE Trans. Emerg. Top. Comput., 4 (1): 128-141 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEPIA: Secure-PIN-Authentication-as-a-Service for ATM Using Mobile and Wearable Devices., , and . MobileCloud, page 41-50. IEEE Computer Society, (2015)Unified authentication factors and fuzzy service access using interaction provenance., and . Comput. Secur., (2017)Litigo: A Cost-Driven Model for Opaque Cloud Services., , , and . CLOUD, page 172-179. IEEE Computer Society, (2016)A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud., and . COMPSAC, page 823-828. IEEE Computer Society, (2016)Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing., , and . MobileCloud, page 183-188. IEEE Computer Society, (2015)Interaction provenance model for unified authentication factors in service oriented computing., and . CODASPY, page 127-130. ACM, (2014)Security mechanisms and data access protocols in innovative wireless networks., , , and . Int. J. Distributed Sens. Networks, (2018)Jugo: A Generic Architecture for Composite Cloud as a Service., , , and . CLOUD, page 806-809. IEEE Computer Society, (2016)OTIT: towards secure provenance modeling for location proofs., , , and . AsiaCCS, page 87-98. ACM, (2014)Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading., , and . Future Gener. Comput. Syst., (2018)