Showing
1 - 6
results of
6
for search '
Jamal, Fara
'
Skip to content
Toggle navigation
Home
Feedback
Your Account
Back
Your Account
Saved Items
Checked Out Items
Holds and Recalls
Fines
Profile
Saved Searches
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Search:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Jamal, Fara
Showing
1 - 6
results of
6
for search '
Jamal, Fara
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Select result number 1
1
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by
Jamal
,
Fara
Published 2021
View full text
Thesis
Save to List
Saved in:
Select result number 2
2
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
by
Jamal
,
Fara
Published 2021
View full text
Thesis
Save to List
Saved in:
Select result number 3
3
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
by
Jamal
,
Fara
,
Abdullah, Mohd Taufik
,
Mohd Hanapi, Zurina
,
Abdullah, Azizol
Published 2019
View full text
Article
Save to List
Saved in:
Select result number 4
4
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by
Jamal
,
Fara
,
Abdullah, Mohd Taufik
,
Mohd Hanapi, Zurina
,
Abdullah, Azizol
Published 2020
Article
Save to List
Saved in:
Select result number 5
5
Enhanced Bring your Own Device (BYOD) environment security based on blockchain technology
by
Jamal
,
Fara
,
Abdullah@Selimun, Mohd. Taufik
,
Abdullah, Azizol
,
Mohd Hanapi, Zurina
Published 2018
View full text
Article
Save to List
Saved in:
Select result number 6
6
A systematic review of Bring Your Own Device (BYOD) authentication technique
by
Jamal
,
Fara
,
Abdullah@Selimun, Mohd. Taufik
,
Abdullah, Azizol
,
Mohd. Hanapi, Zurina
Published 2020
View full text
Article
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...