Author of the publication

A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks.

, , and . J. Inf. Secur. Appl., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A cloud-based secure authentication (CSA) protocol suite for defense against Denial of Service (DoS) attacks., , and . J. Inf. Secur. Appl., (2015)A resource scheduling model for cloud computing data centers., , and . IWCMC, page 213-218. IEEE, (2013)Security Protocols in Service-Oriented Architecture., , and . SERVICES, page 185-186. IEEE Computer Society, (2010)Wireless security: securing mobile UMTS communications from interoperation of GSM., , and . Security and Communication Networks, 6 (4): 498-508 (2013)Solutions to security issues with legacy integration of GSM into UMTS., , and . ICITST, page 614-619. IEEE, (2011)Optimal and suboptimal resource allocation techniques in cloud computing data centers., , and . J. Cloud Computing, (2017)A study of the interface usability issues of mobile learning applications for smart phones from the users perspective., , , and . CoRR, (2015)New correlation-based scheme for image authentication., and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 220-228. SPIE, (2001)A Secure and Localizing Watermarking Technique for Image Authentication ., and . ICIAR (2), volume 3212 of Lecture Notes in Computer Science, page 759-769. Springer, (2004)Localization and security enhancement of block-based image authentication., and . ICIP (1), page 673-676. IEEE, (2005)