Author of the publication

A distributed mobile cloud computing model for secure big data.

, , , and . ICOIN, page 312-316. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Intelligent Application Protection Mechanism for Transportation in V2C Environment., , , and . IEEE Access, (2020)Optical Computing for Digital Signal Process in Incoherent Fiber System Using Positive Realization., , and . FCC, volume 301 of Lecture Notes in Electrical Engineering, page 95-102. Springer, (2014)A Design and Implementation of Profile Based Web Application Securing Proxy., , , and . ISPEC, volume 3903 of Lecture Notes in Computer Science, page 248-259. Springer, (2006)DDoS Detection Algorithm Using the Bidirectional Session., , , and . CN, volume 160 of Communications in Computer and Information Science, page 191-203. Springer, (2011)A Service-oriented DDoS detection mechanism using pseudo state in a flow router., , , , , , and . Multimedia Tools Appl., 74 (16): 6341-6363 (2015)Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module., , and . WISA, volume 5379 of Lecture Notes in Computer Science, page 292-304. Springer, (2008)Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing., , and . Inscrypt, volume 5487 of Lecture Notes in Computer Science, page 240-252. Springer, (2008)Low Power AES Hardware Architecture for Radio Frequency Identification., , , and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 353-363. Springer, (2006)User-Centric Key Management Scheme for Personal Cloud Storage., , , , , and . ICISA, page 1-4. IEEE, (2013)An Integrated XML Security Mechanism for Mobile Grid Application., , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 776-783. Springer, (2004)