Author of the publication

A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.

, , , , and . J. Grid Comput., 13 (4): 651-675 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Performance Comparison of Network Simulators for Wireless Networks., , and . CoRR, (2013)Framework for Ubiquitous Social Networks., , , and . CoRR, (2013)Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems., , , , , and . Comput. Syst. Sci. Eng., (2017)Routing Proposals for Multipath Interdomain Routing., , and . CoRR, (2013)Clustering-based power-controlled routing for mobile wireless sensor networks., , , and . Int. J. Commun. Syst., 25 (4): 529-542 (2012)A Systems Overview of Commercial Data Centers: Initial Energy and Cost Analysis., , , , , and . Int. J. Inf. Technol. Web Eng., 14 (1): 42-65 (2019)Context-Aware Mobile Cloud Computing and Its Challenges., , , and . IEEE Cloud Comput., 2 (3): 42-49 (2015)CPU-RAM-based energy-efficient resource allocation in clouds., , , , and . J. Supercomput., 75 (11): 7606-7624 (2019)Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System., and . IEEE Access, (2022)An Optimal Ride Sharing Recommendation Framework for Carpooling Services., , , , and . IEEE Access, (2018)