Author of the publication

A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing.

, , and . CSS, volume 8300 of Lecture Notes in Computer Science, page 387-402. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Node-Disjoint Multipath Routing with Zoning Method in MANETs., , , and . HPCC, page 456-462. IEEE Computer Society, (2008)Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 207-218. Springer, (2005)An efficient spatial query processing algorithm in multi-sink wireless sensor networks., , , and . Int. J. Sens. Networks, 22 (4): 274-282 (2016)Efficient group key management for multi-privileged groups., , , and . Comput. Commun., 30 (11-12): 2497-2509 (2007)Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating., , , , , and . IEEE Internet Things J., 9 (20): 20681-20692 (2022)A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 560-569. Springer, (2005)Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System., , , , and . CSE, page 58-65. IEEE, (2020)A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks., , , , , and . TrustCom, page 413-419. IEEE, (2021)DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract., , and . TrustCom, page 1290-1295. IEEE, (2022)FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics., , , and . INFOCOM, page 1707-1715. IEEE, (2014)