Author of the publication

Special issue on security and privacy techniques in mobile cloud computing.

, and . J. Ambient Intelligence and Humanized Computing, 7 (5): 607-609 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Next generation mobility management., , , and . Wireless Communications and Mobile Computing, 11 (4): 443-445 (2011)Approaching green sensor field using queue-based optimization technique., , and . J. Network and Computer Applications, (2016)Special issue on security and privacy techniques in mobile cloud computing., and . J. Ambient Intelligence and Humanized Computing, 7 (5): 607-609 (2016)Random Cladding with Feedback Mechanism for encrypting mobile messages., , , , , and . INFOCOM Workshops, page 970-975. IEEE, (2016)Balanced bipartite graph based register allocation for network processors in mobile and wireless networks., , , , and . Mobile Information Systems, 6 (1): 65-83 (2010)Mobile and Wireless Networks., and . Mobile Information Systems, 6 (1): 1-3 (2010)ACSP: A novel security protocol against counting attack for UHF RFID systems., , , and . Computers & Mathematics with Applications, 63 (2): 492-500 (2012)Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution., , , , , and . Mathematical and Computer Modelling, 58 (5-6): 1328-1339 (2013)Opportunistic sharing scheme for spectrum allocation in wireless virtualization., , , , , and . Soft Comput., 18 (9): 1685-1696 (2014)A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices., , , , , and . IMIS, page 595-600. IEEE Computer Society, (2013)