Author of the publication

Applying Different Cryptographic Algorithms for Mobile Cloud Computing.

, , , , and . MUSIC, volume 274 of Lecture Notes in Electrical Engineering, page 111-116. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System., , and . EurAsia-ICT, volume 2510 of Lecture Notes in Computer Science, page 842-849. Springer, (2002)An Evaluation and Analysis for IP VPN Model in IPv6 Transition Environment., , , and . ICCSA (2), volume 3981 of Lecture Notes in Computer Science, page 135-144. Springer, (2006)Efficient and accurate protocols for distributed delaunay triangulation under churn., and . ICNP, page 124-136. IEEE Computer Society, (2008)Taste of AOP : Blending concerns in cluster computing software., , , and . CLUSTER, page 110-117. IEEE Computer Society, (2007)A Cyber-Security Implementation Framework for Nuclear Power Plant Control Systems., , , , and . ICHIT (2), volume 206 of Communications in Computer and Information Science, page 190-195. Springer, (2011)An Analysis and Evaluation of Policy-Based Network Management Approaches., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 590-599. Springer, (2005)Tip Prefetching: Dealing with the Bit Rate Variability of Video Streams., and . ICMCS, Vol. 2, page 352-356. IEEE Computer Society, (1999)0-7695-0253-9.Performance Analysis of WiMAX Best Effort and ertPS Service Classes for Video Transmission., , , , , and . ICCSA (3), volume 7335 of Lecture Notes in Computer Science, page 368-375. Springer, (2012)Group rekeying with limited unicast recovery., , and . ICC, page 707-714. IEEE, (2003)An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based Network., , , and . ICCSA (5), volume 3984 of Lecture Notes in Computer Science, page 626-634. Springer, (2006)