Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Manojkumar Vivekanandan"'
Autor:
Neeraj Kumar Sharma, Sriramulu Bojjagani, Y. C. A. Padmanabha Reddy, Manojkumar Vivekanandan, Jagadeesan Srinivasan, Anup Kumar Maurya
Publikováno v:
IEEE Access, Vol 11, Pp 107480-107495 (2023)
Due to the rapid utilization of cloud services, the energy consumption of cloud data centres is increasing dramatically. These cloud services are provided by Virtual Machines (VMs) through the cloud data center. Therefore, energy-aware VMs allocation
Externí odkaz:
https://doaj.org/article/28f50b5f11ba470e9635df760fb8cc08
Autor:
Manojkumar Vivekanandan, Praveen Kumar Premkamal, C.I. Johnpaul, Silambarasan Elkana Ebinazer
Publikováno v:
2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT).
Publikováno v:
2023 International Conference on Advances in Intelligent Computing and Applications (AICAPS).
MAPMCECCM: a mutual authentication protocol for mobile cloud environment using Chebyshev Chaotic Map
Publikováno v:
Telecommunication Systems. 78:477-496
Cloud services are expanding tremendously in mobile environment with the advent of wireless technology. However, privacy in accessing the cloud services securely is the prime concern of the mobile user. To address the user privacy issue, a secure mut
Publikováno v:
Peer-to-Peer Networking and Applications. 14:1572-1595
The development in cloud computing platforms has resulted, hosting many day-to-day service applications in the cloud. To avail the services provided by different cloud service providers (CSPs), the mobile user has to register his/her identity with th
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 11:1933-1956
The rapid growth of smart-phone users, mobile services and mobile applications, poses the challenges of storage space, processing capability, and battery lifetime at the users smart phones. Mobile cloud computing helps to overcome these challenges. P
Publikováno v:
ISBA
Mobile user authentication is a challenging task in the mobile cloud computing (MCC). In 2015, Tsai and Lo’s developed authentication protocol in distributed MCC. Which is vulnerable to the biometric misuse, incorrect login credentials (password an