Security and Challenges in Mobile Cloud Computing
暂无分享,去创建一个
[1] Athanasios V. Vasilakos,et al. MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing , 2013, 2013 IEEE Sixth International Conference on Cloud Computing.
[2] Ciprian Dobre,et al. Intelligent services for Big Data science , 2014, Future Gener. Comput. Syst..
[3] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[4] Wei-Tek Tsai,et al. Multi-factor web API security for securing Mobile Cloud , 2015, 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[5] Shaheed Zulfikar,et al. Security Issues and Challenges of Mobile Cloud Computing , 2013 .
[6] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[7] J. Wenny Rahayu,et al. Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..
[8] Jörg Schwenk,et al. All your clouds are belong to us: security analysis of cloud management interfaces , 2011, CCSW '11.
[9] RahayuWenny,et al. Mobile cloud computing , 2013 .
[10] Mojtaba Alizadeh,et al. Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[11] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[12] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.
[13] Feng Xia,et al. Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing , 2013, Information Systems Frontiers.
[14] BottaAlessio,et al. Survey Cloud monitoring , 2013 .
[15] S. Rajalakshmi,et al. Mobile Cloud Computing: Standard Approach to Protecting and Securing of Mobile Cloud Ecosystems , 2013, 2013 International Conference on Computer Sciences and Applications.
[16] Dijiang Huang,et al. Mobile cloud computing service models: a user-centric approach , 2013, IEEE Network.
[17] Bharat K. Bhargava,et al. A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.
[18] Ke Xu,et al. A Survey of Research on Mobile Cloud Computing , 2011, 2011 10th IEEE/ACIS International Conference on Computer and Information Science.
[19] Junsheng Zhang,et al. Data Security and Privacy in Cloud Computing , 2014 .
[20] Athanasios V. Vasilakos,et al. Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things , 2017, IEEE Cloud Computing.
[21] Zhifeng Xiao,et al. Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[22] Yunheung Paek,et al. Fast dynamic execution offloading for efficient mobile cloud computing , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[23] VasilakosAthanasios,et al. Security and privacy challenges in mobile cloud computing , 2017 .
[24] Antonio Pescapè,et al. Cloud monitoring: A survey , 2013, Comput. Networks.
[25] Ramesh Govindan,et al. Odessa: enabling interactive perception applications on mobile devices , 2011, MobiSys '11.
[26] Seung Ryoul Maeng,et al. H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor , 2015, IEEE Transactions on Computers.
[27] Rajkumar Buyya,et al. Inter‐Cloud architectures and application brokering: taxonomy and survey , 2014, Softw. Pract. Exp..
[28] Kim-Kwang Raymond Choo,et al. Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment , 2017, Comput. Stand. Interfaces.
[29] Zhangdui Zhong,et al. Challenges on wireless heterogeneous networks for mobile cloud computing , 2013, IEEE Wireless Communications.
[30] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[31] Wu He,et al. Developing Vehicular Data Cloud Services in the IoT Environment , 2014, IEEE Transactions on Industrial Informatics.
[32] Qing Yang,et al. HMOG: New Behavioral Biometric Features for Continuous Authentication of Smartphone Users , 2015, IEEE Transactions on Information Forensics and Security.
[33] Yunheung Paek,et al. Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing , 2014, IEEE Transactions on Mobile Computing.
[34] Imad H. Elhajj,et al. Partial mobile application offloading to the cloud for energy-efficiency with security measures , 2015, Sustain. Comput. Informatics Syst..