Author:
Reshma G.,Prasanna B. T.,Murthy H. S. Niranjana,Murthy T. S. N.,Parthiban S.,Sangeetha M.
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference42 articles.
1. Ahmad I, Kumar T, Liyanage M, Okwuibe J, Ylianttila M, Gurtov A (2018) Overview of 5G security challenges and solutions. IEEE Commun Stand Mag 2:36–43
2. Al-Assam H, Hassan W, Zeadally S (2019) Automated biometric authentication with cloud computing. In: Obaidat M, Traore I, Woungang I (eds) Biometric-based physical and cybersecurity systems. Springer, Cham, pp 455–475
3. Cao H, Cai J (2018) Distributed multiuser computation offloading for cloudletbased mobile cloud computing: a game-theoretic machine learning approach. IEEE Trans Veh Technol 67(1):752–764
4. Dulari P, Bhushan B (2019) A novel approach for cloud data security enhancement through cryptography and biometric in the government cloud environment. Int J Comput Sci Mob Comput 8(12):59–63
5. Eshratifar AE, Esmaili A, Pedram M (2019) BottleNet: a deep learning architecture for intelligent mobile cloud computing services. In: Proceedings of the international symposium on low power electronics and design, pp 1–6
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献