Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: A survey,” Futur. Gener. Comput. Syst., 2013, doi: 10.1016/j.future.2012.05.023.
    2. J. Samad, S. W. Loke, and K. Reed, “Mobile Cloud Computing,” in Cloud Services, Networking, and Management, 2015.
    3. N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, “Mobile Edge Computing: A Survey,” IEEE Internet of Things Journal. 2018, doi: 10.1109/JIOT.2017.2750180.
    4. J. Liu, E. Ahmed, M. Shiraz, A. Gani, R. Buyya, and A. Qureshi, “Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions,” Journal of Network and Computer Applications. 2015, doi: 10.1016/j.jnca.2014.09.009.
    5. H. Shaikha and A. Sallow, “Mobile Cloud Computing: A Review,” Acad. J. Nawroz Univ., 2017, doi: 10.25007/ajnu.v6n3a96.
    6. A. N. Khan, M. L. Mat Kiah, S. U. Khan, and S. A. Madani, “Towards secure mobile cloud computing: A survey,” Futur. Gener. Comput. Syst., 2013, doi: 10.1016/j.future.2012.08.003.
    7. D. Dev and K. L. Baishnab, “A review and research towards mobile cloud computing,” in Proceedings - 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2014, 2014, doi: 10.1109/MobileCloud.2014.41.
    8. L. Ramavathu, M. Bairam, and S. Manchala, “A framework for secure mobile cloud computing,” in Advances in Intelligent Systems and Computing, 2017, vol. 507, pp. 353–363, doi: 10.1007/978-981-10-2471-9_34.
    9. P. Bhattacharya, S. Tanwar, R. Shah, and A. Ladha, “Mobile edge computing-enabled blockchain framework—A survey,” in Lecture Notes in Electrical Engineering, 2020, vol. 597, pp. 797–809, doi: 10.1007/978-3-030-29407- 6_57.
    10. M. Ali, S. U. Khan, and A. V. Vasilakos, “Security in cloud computing: Opportunities and challenges,” Inf. Sci. (Ny)., 2015, doi: 10.1016/j.ins.2015.01.025.

Recent Article