Review Article

Mobile Cloud Computing: Taxonomy and Challenges

Table 7

Analysis of security and privacy techniques for MCC.

ReferenceTechniqueApproachImplementationMetrics
SCFW/ATALENN-ENCPU-DTECCTRULTEN/DN-TCO

CMReS [38]
ESACSM [39]
RMTAC [40]
EACDAC [41]
PADMC [42]