Showing 1 - 12 results of 12 for search 'Alizadeh, Mojtaba', query time: 0.02s
Refine Results
-
1
Challenges and opportunities of mobile cloud computing by Alizadeh, Mojtaba, Hassan, Wan Haslina
Published 2013Conference or Workshop Item -
2
A brief review of mobile cloud computing opportunities by Alizadeh, Mojtaba, Hassan, Wan Haslina, Behboodian, Navid, Karamizadeh, Sasan
Published 2013Article -
3
-
4
-
5
Trusted computing strengthens cloud authentication by Ghazizadeh, Eghbal, Zamani, Mazdak, Ab. Manan, Jamalul Lail, Alizadeh, Mojtaba
Published 2014Article -
6
A survey on attacks in RFID networks by Alizadeh, Mojtaba, Zamani, Mazdak, Shahemabadi, Ali Rafiei, Shayan, Jafar, Azarnik, Ahmad
Published 2012Article -
7
-
8
-
9
-
10
-
11
-
12
Cryptanalysis and improvement of "a secure password authentication mechanism for seamless handover in proxy mobile IPv6 networks" by Alizadeh, Mojtaba, Zamani, Mazdak, Baharun, Sabariah, Abdul Manaf, Azizah, Sakurai, Kouichi, Anada, Hiroaki, Keshavarz, Hassan, Chaudhry, Shehzad Ashraf, Khan, Muhammad Khurram
Published 2015
Article