Author of the publication

Conceptual framework for the security of mobile health applications on Android platform.

, , , , , , and . Telematics and Informatics, 35 (5): 1335-1354 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service., , , , , , and . J. Network and Computer Applications, (2016)Service delivery models of cloud computing: security issues and open challenges., , , , , and . Security and Communication Networks, 9 (17): 4726-4750 (2016)Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis., , , , , , , , , and 3 other author(s). IEEE Access, (2016)Host mobility key management in dynamic secure group communication., , , , and . Wireless Networks, 24 (8): 3009-3027 (2018)Key management paradigm for mobile secure group communications: Issues, solutions, and challenges., , , , and . Computer Communications, (2015)Conceptual framework for the security of mobile health applications on Android platform., , , , , , and . Telematics and Informatics, 35 (5): 1335-1354 (2018)Knowledge Management., , , and . Collaboration and the Semantic Web, IGI Global, (2012)A Selective Cross-Substitution Technique for Encrypting Color Images Using Chaos, DNA Rules and SHA-512., , , , , and . IEEE Access, (2019)