Author of the publication

Internet data budget allocation policies for diverse smartphone applications.

, , , , , , and . EURASIP J. Wireless Comm. and Networking, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Digital droplets: Microsoft SkyDrive forensic data remnants., and . Future Generation Comp. Syst., 29 (6): 1378-1394 (2013)Data Recovery from Proprietary Formatted Cctv Hard Disks., , and . IFIP Int. Conf. Digital Forensics, volume 410 of IFIP Advances in Information and Communication Technology, page 213-223. Springer, (2013)Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept., and . TrustCom, page 935-942. IEEE Computer Society, (2014)Cloud Attack and Risk Assessment Taxonomy., and . IEEE Cloud Computing, 2 (1): 14-20 (2015)Multi-sender Broadcast Authentication in Wireless Sensor Networks., , and . CIS, page 633-637. IEEE Computer Society, (2014)An Android Social App Forensics Adversary Model., , and . HICSS, page 5597-5606. IEEE Computer Society, (2016)Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting.. CSFW, page 297-308. IEEE Computer Society, (2006)Context-oriented web application protection model., , and . Applied Mathematics and Computation, (2016)Cloud based data sharing with fine-grained proxy re-encryption., , , , , and . Pervasive and Mobile Computing, (2016)Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery., , , and . AINA, page 941-948. IEEE Computer Society, (2016)