Authentication in mobile cloud computing: A survey (English)
- New search for: Alizadeh, Mojtaba
- Further information on Alizadeh, Mojtaba:
- https://orcid.org/0000-0002-5601-8387
- New search for: Abolfazli, Saeid
- Further information on Abolfazli, Saeid:
- https://orcid.org/0000-0002-6350-9707
- New search for: Zamani, Mazdak
- New search for: Baharun, Sabariah
- New search for: Sakurai, Kouichi
- New search for: Alizadeh, Mojtaba
- New search for: Abolfazli, Saeid
- New search for: Zamani, Mazdak
- New search for: Baharun, Sabariah
- New search for: Sakurai, Kouichi
In:
Journal of Network and Computer Applications
;
61
;
59-80
;
2015
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Authentication in mobile cloud computing: A survey
-
Contributors:Alizadeh, Mojtaba ( author ) / Abolfazli, Saeid ( author ) / Zamani, Mazdak ( author ) / Baharun, Sabariah ( author ) / Sakurai, Kouichi ( author )
-
Published in:Journal of Network and Computer Applications ; 61 ; 59-80
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2015-10-18
-
Size:22 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 61
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Collaborative distributed communication in heterogeneous environments: A comprehensive surveyGhate, Pritish Vijayanand / Pati, Hemanta Kumar et al. | 2015
- 21
-
A comparative analysis of node replica detection schemes in wireless sensor networksMishra, Alekha Kumar / Turuk, Ashok Kumar et al. | 2015
- 33
-
A novel IPv6 address configuration for a 6LoWPAN-based WBANWang, Xiaonan / Chen, Hongbin / Le, Deguang et al. | 2015
- 46
-
Design and performance evaluation of distributed mobility management schemes for network mobilityErnest, Petro P. / Falowo, Olabisi E. / Chan, H. Anthony et al. | 2015
- 59
-
Authentication in mobile cloud computing: A surveyAlizadeh, Mojtaba / Abolfazli, Saeid / Zamani, Mazdak / Baharun, Sabariah / Sakurai, Kouichi et al. | 2015
- 81
-
A survey of fault tolerance architecture in cloud computingNazari Cheraghlou, Mehdi / Khadem-Zadeh, Ahmad / Haghparast, Majid et al. | 2015
- 93
-
3D space detection and coverage of wireless sensor network based on spatial correlationXiang, Yu / Xuan, Zhaoguang / Tang, Meng / Zhang, Jun / Sun, Ming et al. | 2015
- 102
-
Energy-balanced compressive data gathering in Wireless Sensor NetworksLv, Cuicui / Wang, Qiang / Yan, Wenjie / Shen, Yi et al. | 2015
- 115
-
Secure Group Communication in Wireless Sensor Networks: A surveyCheikhrouhou, Omar et al. | 2015
- 133
-
Null-frequency jamming of a proactive routing protocol in wireless mesh networksLall, Shruti / Maharaj, B.T.J. / Vuuren, P.A. Jansen van et al. | 2015
- 142
-
A fully-decentralized semantic mechanism for autonomous wireless sensor nodesRocha, Atslands R. / Delicato, Flávia C. / Pirmez, Luci / Gomes, Danielo G. / Souza, José Neuman de et al. | 2015
- 161
-
Spectrum handoff in cognitive radio networks: A classification and comprehensive surveyKumar, Krishan / Prakash, Arun / Tripathi, Rajeev et al. | 2015
- 189
-
A multi-RAT bandwidth aggregation mechanism with software-defined networkingYang, Shun-Neng / Ho, Shu-Wei / Lin, Yi-Bing / Gan, Chai-Hien et al. | 2015
- 199
-
Secure and dependable software defined networksAkhunzada, Adnan / Gani, Abdullah / Anuar, Nor Badrul / Abdelaziz, Ahmed / Khan, Muhammad Khurram / Hayat, Amir / Khan, Samee U. et al. | 2015
- 222
-
Adaptive marking threshold method for delay-sensitive TCP in data center networkZhang, Tao / Wang, Jianxing / Huang, Jiawei / Huang, Yi / Chen, Jianer / Pan, Yi et al. | 2015
- IFC
-
Editorial board| 2016