Author of the publication

Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System.

, , , , and . Networking Workshops, volume 6827 of Lecture Notes in Computer Science, page 243-250. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Framework for context-aware computation offloading in mobile cloud computing., , , , , and . J. Cloud Comput., (2017)Time Controlled Expressive Predicate Query With Accountable Anonymity., , , , , , and . IEEE Trans. Serv. Comput., 16 (2): 1444-1457 (March 2023)Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data., , , , , and . IEEE Trans. Cloud Comput., 10 (4): 2595-2612 (2022)Resource Allocation for Cloud-Based Software Services Using Prediction-Enabled Feedback Control With Reinforcement Learning., , , , , and . IEEE Trans. Cloud Comput., 10 (2): 1117-1129 (2022)An Ensemble Approach for Multi-Step Ahead Energy Forecasting of Household Communities., , , , and . IEEE Access, (2021)Adaptive Resource Allocation and Consolidation for Scientific Workflow Scheduling in Multi-Cloud Environments., , , , , and . IEEE Access, (2020)IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications., , , , and . IEEE Access, (2021)On Ubiquitous Integrated Computing., and . Int. J. Comput. Sci. Appl., 5 (3): 46-55 (2008)Flexible building blocks for software defined network function virtualization., and . QSHINE, page 37-43. IEEE, (2014)Deployment models: Towards eliminating security concerns from cloud computing., , , and . HPCS, page 189-195. IEEE, (2010)