-
1
-
-
84929097620
-
Operator centric mobile cloud architecture
-
Bou Abdo, J., Demerjian, J., Chaouchi, H., Barbar, K. & Pujolle, G, "Operator Centric Mobile Cloud Architecture", 2014 IEEE Wireless Communications and Networking Conference.
-
2014 IEEE Wireless Communications and Networking Conference
-
-
Bou Abdo, J.1
Demerjian, J.2
Chaouchi, H.3
Barbar, K.4
Pujolle, G.5
-
2
-
-
84891583756
-
-
John Wiley & Sons Ltd
-
Forsberg, D., Horn, G. , Moeller, W., & Niemi, V., "LTE Security", John Wiley & Sons Ltd, 2010.
-
(2010)
LTE Security
-
-
Forsberg, D.1
Horn, G.2
Moeller, W.3
Niemi, V.4
-
6
-
-
84879859340
-
Ec-aka2 a revolutionary aka protocol
-
Bou Abdo, J., Demerjian, J., Chaouchi, H., & Pujolle, G. "EC-AKA2 a revolutionary AKA protocol", 2013 International Conference on Computer Applications Technology.
-
2013 International Conference on Computer Applications Technology
-
-
Bou Abdo, J.1
Demerjian, J.2
Chaouchi, H.3
Pujolle, G.4
-
7
-
-
84875933028
-
EPS mutual authentication and Crypt-analyzing SPAKA
-
Bou Abdo, J., Demerjian, J., Ahmad, K., Chaouchi, H., & Pujolle, G., "EPS mutual authentication and Crypt-analyzing SPAKA" 2013 International Conference on Computing, Management and Telecommunications (ComManTel), (pp. 303-308).
-
2013 International Conference on Computing, Management and Telecommunications (ComManTel)
, pp. 303-308
-
-
Bou Abdo, J.1
Demerjian, J.2
Ahmad, K.3
Chaouchi, H.4
Pujolle, G.5
-
8
-
-
84875942478
-
Security v/s qos for lte authentication and key agreement protocol
-
Bou Abdo, J., Demerjian, J., & Chaouchi, H., "Security V/S Qos for LTE Authentication And Key Agreement Protocol", International Journal of Network Security & Its Applications special issue on: "Communications Security & Information Assurance
-
International Journal of Network Security & Its Applications Special Issue On: "communications Security & Information Assurance
-
-
Bou Abdo, J.1
Demerjian, J.2
Chaouchi, H.3
-
9
-
-
84864834720
-
Ensured confidentiality authentication and key agreement protocol for eps
-
Bou Abdo, J., Chaouchi, H., & Aoude, M., "Ensured confidentiality authentication and key agreement protocol for EPS", 2012 Symposium on Broadband Networks and Fast Internet (RELABIRA), (pp. 73-77).
-
2012 Symposium on Broadband Networks and Fast Internet (RELABIRA)
, pp. 73-77
-
-
Bou Abdo, J.1
Chaouchi, H.2
Aoude, M.3
-
10
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
Chun, B. G., Ihm, S., Maniatis, P., Naik, M., & Patti, A., "Clonecloud: Elastic execution between mobile device and cloud.", Sixth conference on Computer systems, (pp. 301-314).
-
Sixth Conference on Computer Systems
, pp. 301-314
-
-
Chun, B.G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
12
-
-
70350136710
-
The case for VM-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, & N. Davies, "The case for VM-based cloudlets in mobile computing", IEEE Pervasive Computing, (pp. 14-23).
-
IEEE Pervasive Computing
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
15
-
-
84866912987
-
-
Mohan, S., Kapoor, R., & Mohanty, B, "Latency in HSPA data networks.", white paper of Qualcomm.
-
Latency in HSPA Data Networks. White Paper of Qualcomm
-
-
Mohan, S.1
Kapoor, R.2
Mohanty, B.3
|