2016 23rd International Conference on Telecommunications (ICT) 2016
DOI: 10.1109/ict.2016.7500487
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative models in cloud and mobile cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…In Sybil attack users assume fake identities to ruin a voting application, change its results, swing the conversation mood and damage the social network or page/account reputation. Therefore, there is a need for a resilient and robust applications and platforms to defend against such possible attacks [20,21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In Sybil attack users assume fake identities to ruin a voting application, change its results, swing the conversation mood and damage the social network or page/account reputation. Therefore, there is a need for a resilient and robust applications and platforms to defend against such possible attacks [20,21].…”
Section: Literature Reviewmentioning
confidence: 99%
“…is paradigm enables the use of mobile devices to consume resident web services within the cloud computing architecture [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%