Omaimah Bamasag

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This paper provides a comprehensive security analysis of Mobile Cloud Computing (M2C). It first describes two Cloud Computing (CC) scenarios. The first scenario describes one Cloud service provider providing all necessary services. The second scenario describes the case of two Cloud service providers collaborating to provide necessary services for one(More)
In this paper, we propose a novel continuous multicast authentication protocol for the Internet of Things applications based on secret sharing scheme. This protocol provides secure and efficient multicast authentication for frequent message transmissions in short session time interval. The protocol solves the problem of shared key among communicating group(More)
  • 1