Author of the publication

Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing.

, , and . MobileCloud, page 183-188. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives., , , , , and . Future Internet, 16 (2): 40 (February 2024)The Life and Death of Unwanted Bits: Towards Proactive Waste Data Management in Digital Ecosystems, and . CoRR, (2011)e-ESAS: Evolution of a participatory design-based solution for breast cancer (BC) patients in rural Bangladesh., , , , , , , , , and . Personal and Ubiquitous Computing, 19 (2): 395-413 (2015)Interaction provenance model for unified authentication factors in service oriented computing., and . CODASPY, page 127-130. ACM, (2014)A Straightforward Author Profiling Approach in MapReduce., , , and . IBERAMIA, volume 8864 of Lecture Notes in Computer Science, page 95-107. Springer, (2014)A statistical analysis of disclosed storage security breaches., and . StorageSS, page 1-8. ACM, (2006)Introducing secure provenance: problems and challenges., , and . StorageSS, page 13-18. ACM, (2007)Requirements of Secure Storage Systems for Healthcare Records., , and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 174-180. Springer, (2007)Towards building a forensics aware language for secure logging., , and . Comput. Sci. Inf. Syst., 11 (4): 1291-1314 (2014)Smart bracelets: Towards automating personal safety using wearable smart jewelry., and . CCNC, page 1-2. IEEE, (2018)