Performance Analysis of a Priority based Resource Allocation Scheme in Ubiquitous NetworksA Novel LIPA Scheme for LTE VoIP Services with Home eNBsDouble Encryption for Data Authenticity and Integrity in Privacy-preserving Confidential Forensic InvestigationOn the Order of Search for Personal Identification with Biometric ImagesFacilitating Multi-Device Usage in mHealthClustering Models in Secure Clustered Multiparty ComputationPreserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and EncryptionEnergy Aware Task Scheduling in Data CentersAn Agent-based Optimization Framework for Mobile-Cloud ComputingEvidence and Cloud Computing: The Virtual Machine Introspection Approach