I Indu,
PMR Anand, SP Shaji - Indian Journal …, 2016 - sciresol.s3.us-east-2.amazonaws …
Objectives: The use of the mobile devices in cloud computing environment is susceptible to
various kinds of attacks like, unauthorized access, account/service hijacking, data breach …