Author of the publication

COCA: Computation Offload to Clouds Using AOP.

, , and . CCGRID, page 466-473. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN., , , and . J. Inf. Hiding Multim. Signal Process., 4 (1): 57-72 (2013)Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be., , , , , , , , , and 4 other author(s). CoRR, (2017)oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks., , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 651-663 (2012)A Pair-wise Key Establishment for Wireless Sensor Networks., , , and . IIH-MSP, page 1152-1155. IEEE Computer Society, (2009)COCA: Computation Offload to Clouds Using AOP., , and . CCGRID, page 466-473. IEEE Computer Society, (2012)SPATE: small-group PKI-less authenticated trust establishment., , , , , , , , , and . MobiSys, page 1-14. ACM, (2009)RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks., , , and . IEEE Trans. Parallel Distributed Syst., 23 (4): 727-734 (2012)Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles., , , and . WISEC, page 51-56. ACM, (2014)SPATE: Small-Group PKI-Less Authenticated Trust Establishment., , , , , , , , , and 3 other author(s). IEEE Trans. Mob. Comput., 9 (12): 1666-1681 (2010)Eliminating rouge femtocells based on distance bounding protocol and geographic information., , , and . Expert Syst. Appl., 41 (2): 426-433 (2014)