K.Ruben Raju    
Danekula Rajya Lakshmi    
Prof.Dr.G.Manoj Someswar    


The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that their work is original and has not appeared in a publication elsewhere. As such this article represents a severe abuse of the scientific publishing system. Apologies are offered to readers of the journal that this was not detected during the submission process.

 Artículos similares

Diego Ordonez-Camacho    
The Internet of Things has emerged as one of the most promising trends today. The speed of its adoption, however, has caused certain gaps. Amongst the most critical there is the one related with the security of the systems involved. This project addresse... ver más

V. Belsky,I. Gerasimov,K. Tsaregorodtsev,I. Chizhov     Pág. 1 - 23
?Personal data exchange and disclosure prevention are widespread problems in our digital world. There are a couple of information technologies embedded in the commercial and government processes. People need to exchange their personal information while u... ver más

Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono     Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an... ver más

Meriem Houmer,Mariya Ouaissa,Mariyam Ouaissa,Moulay Lahcen Hasnaoui     Pág. pp. 48 - 64
In Intelligent Transport Systems (ITS), Vehicular Ad-hoc Networks (VANET) play an essential role in improving road safety and traffic efficiency. Nevertheless, due to its special characteristics like high mobility, large size of the network and dynamic t... ver más

Adnan Mohsin Abdulazeez,Baraa Wasfi Salim,Diyar Qader Zeebaree,Dana Doghramachi     Pág. pp. 157 - 177
The key point of this paper is to assess and look over the top of the line network layer-based VPN (Virtual Private Network) protocols because data link layer is hardly ever found to be in use in organizations, the reason is because of its exceedingly hi... ver más