Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …

Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

On joint BBU/RRH resource allocation in heterogeneous cloud-RANs

K Wang, W Zhou, S Mao - IEEE Internet of Things Journal, 2017 - ieeexplore.ieee.org
Cloud radio access network (Cloud-RAN) is a promising wireless network architecture that
can satisfy the fast growing mobile data traffic and improve the performance of Internet of …

Joint content placement and storage allocation in C-RANs for IoT sensing service

J Yao, N Ansari - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) sensing service allows systems and users to monitor
environment states by transmitting the content sensed by a variety of sensors. Owing to …

Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues

MA Ferrag, L Maglaras, A Derhab, H Janicke - Telecommunication …, 2020 - Springer
This paper presents a comprehensive investigation of authentication schemes for smart
mobile devices. We start by providing an overview of existing survey articles published in the …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

Reservoir computing: Quo vadis?

A Goudarzi, C Teuscher - Proceedings of the 3rd ACM International …, 2016 - dl.acm.org
Reservoir Computing (RC) is an umbrella term for adaptive computational paradigms that
rely on an excitable dynamical system, also called the" reservoir." The paradigms have been …

Secure mobile multi cloud architecture for authentication and data storage

K Zkik, G Orhanou, S El Hajji - International Journal of Cloud …, 2017 - igi-global.com
Abstract The use of Cloud Computing in the mobile networks offer more advantages and
possibilities to the mobile users such as storing, downloading and making calculation on …

Efficient user based authentication protocol for location based services discovery over road networks

I Memon, QA Arain, H Memon, FA Mangi - Wireless Personal …, 2017 - Springer
In road network, the decision accuracy of event message under location privacy-enhanced
scheme, fast forwarding falsification message, and collusion attacks are all knotty problems …

Dynamic reciprocal authentication protocol for mobile cloud computing

AA Ahmed, K Wendy, MN Kabir… - IEEE Systems …, 2020 - ieeexplore.ieee.org
A combination of mobile and cloud computing delivers many advantages such as mobility,
resources, and accessibility through seamless data transmission via the Internet anywhere …