Author of the publication

Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.

, , , , and . Future Gener. Comput. Syst., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auditing Big Data Storage in Cloud Computing Using Divide and Conquer Tables., , and . IEEE Trans. Parallel Distributed Syst., 29 (5): 999-1012 (2018)Recent advances in cloud data centers toward fog data centers., , , and . Concurr. Comput. Pract. Exp., (2019)Privacy-Preserving and Security in SDN-Based IoT: A Survey., , , , and . IEEE Access, (2023)Cloud resource allocation schemes: review, taxonomy, and opportunities., , , , , , and . Knowl. Inf. Syst., 50 (2): 347-381 (2017)Proposing a Secure Self-Fining Vehicle Using Blockchain and Vehicular Edge Computing., , , and . IEEE Consumer Electron. Mag., 11 (2): 28-35 (2022)Fog Vehicular Computing: Augmentation of Fog Computing Using Vehicular Cloud Computing., , , , , , , and . IEEE Veh. Technol. Mag., 12 (3): 55-64 (2017)Intelligent Networking for Energy Harvesting Powered IoT Systems., , , , , and . ACM Trans. Sens. Networks, 20 (2): 45:1-45:31 (March 2024)Ultrafusion: Optimal Fuzzy Fusion in Land-Cover Segmentation Using Multiple Panchromatic Satellite Images., , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2024)Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions., , , , , , , , and . J. Netw. Comput. Appl., (2015)Utilizing fully homomorphic encryption to implement secure medical computation in smart cities., , , , and . Pers. Ubiquitous Comput., 21 (5): 831-839 (2017)