Author:
Somula Ramasubbareddy,Anilkumar Chunduru,Venkatesh B.,Karrothu Aravind,Pavan Kumar C. S.,Sasikala R.
Reference24 articles.
1. Kaur K, Kaur Walia N (2014) Survey on mobile cloud computing. Int J Sci Res (IJSR) 3(6):2536–2540
2. Tawalbeh LA, Ababneh F, Jararweh Y, AlDosari F (2016) Trust delegation based secure mobile cloud computing framework. Int J Inf Comput Secur 8(3)
3. Tawalbeh L, Mowafi M, Aljoby W (2013) Use of elliptic curve cryptography for multimedia encryption. IET Inf Secur 7(2):67–74
4. Goswami G (2013) Mobile computing. Int J Adv Res Comput Sci Softw Eng 846–855
5. Zimmerman JB (1999) Mobile computing: characteristics, business benefits, and the mobile framework. Univ Md. Eur Div-Bowie State 10:12
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献