Author of the publication

On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.

, , , , , and . IEEE Internet Things J., 6 (3): 4521-4535 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication., , , and . IACR Cryptol. ePrint Arch., (2013)Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing., , and . INTRUST, volume 6802 of Lecture Notes in Computer Science, page 189-199. Springer, (2010)Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 1-16. Springer, (2010)Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity., , , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 369-382. Springer, (2004)Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems., and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 284-300. Springer, (2007)Private Query on Encrypted Data in Multi-user Settings., , , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 71-85. Springer, (2008)A New Architecture for User Authentication and Key Exchange Using Password for Federated Enterprises., , and . SEC, volume 181 of IFIP, page 95-112. Springer, (2005)Forensic-by-Design Framework for Cyber-Physical Cloud Systems., , , and . IEEE Cloud Comput., 3 (1): 50-59 (2016)Human-Driven Edge Computing and Communication: Part 1., , , , , and . IEEE Commun. Mag., 55 (11): 70-71 (2017)Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security., , , , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 151-166. Springer, (2009)