Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing

AN Khan, ML Mat Kiah, SA Madani, AR Khan… - The Journal of …, 2013 - Springer
To improve the resource limitation of mobile devices, mobile users may utilize cloud-
computational and storage services. Although the utilization of the cloud services improves …

[PDF][PDF] SECURITY ISSUE AND CHALLENGES FOR MOBILE CLOUD COMPUTING

PE Lone - irjmets.com
Cloud computing is proving it is an emerging technology in IT world. Mobile Cloud
Computing (MCC) is a combination of three main parts, they are mobile device, cloud …

[引用][C] PERFORMANCE EVALUATION OF AOMDV AND IAOMDV UNDER PRETTY GOOD PRIVACY MODEL

P Bansal, AK Gupta

A Survey of Security and Privacy in Mobile Cloud Computing

B Rayapuri - 2018 - scholarworks.wmich.edu
Cloud Computing is an emerging technology that provides shared processing resources
and data to computers and other devices on demand. On the other hand, Mobile Computing …

[PDF][PDF] A Framework for Mobile Cloud Computing

RL Naik, S Sarma - … Journal of Computer Networking, Wireless and …, 2013 - academia.edu
ABSTRACT Mobile Cloud Computing (MCC) which combines mobile computing and cloud
computing, has become one of the industry buzz words and a major discussion thread in the …

Energy Optimization for MANET

A Kumar Sharma, M Alam - … of the 5th International Conference on …, 2019 - papers.ssrn.com
The routing protocol on which the MANET works or the technic of MANET has a basic
standard which can control many nodes on it's network that makes a proper way to route a …

A Study of Energy Optimization for MANET

AK Sharma, DKC Noida… - 2019 6th International …, 2019 - ieeexplore.ieee.org
The routing protocol on which the MANET works, or the technic of MANET has a basic
standard which can control many nodes on it's network that makes a proper way to route a …

[PDF][PDF] Challenges in Implementation of Mobile Cloud Computing (MCC) in Afghanistan

O Dadgar, S Ahmadi - ijisrt.com
Cloud computing which makes ground for using the potential capacity, information, and
resources in the form of software, hardware, and data beyond the existing context in our …

[引用][C] Access management and Data path prediction for securing cloud-based services and enhancing cybersecurity solutions

O Abdulkader, AM Bamhdi… - …, 2018 - … OFFICE 301, SANGDO 5 DONG 509 …

[PDF][PDF] A brief review of mobile cloud computing opportunities

M Alizadeh, WH Hassan, N Behboodian… - Research Notes in …, 2013 - academia.edu
Cloud Computing (CC) is b ecoming popular as the latest technology in the infrastructure of
the computing world. The CC allows the users to m ake use of th e resources when n eeded …