Offline Mode for Corporate Mobile Client Security Architecture
暂无分享,去创建一个
Rafael Timóteo de Sousa Júnior | Edison Pignaton de Freitas | Robson de Oliveira Albuquerque | João Paulo Carvalho Lustosa da Costa | Giovanni Del Galdo | Tatiana Galibus | Thiago P. de B. Vieira | Anton Zaleski | Viktor Krasnoproshin | H. E. R. M. Vissia | E. P. Freitas | G. D. Galdo | J. Costa | V. Krasnoproshin | Tatiana Galibus | Anton Zaleski | H. Vissia | R. D. O. Albuquerque | T. Vieira
[1] Tatyana Galibus,et al. Generalized Mignotte's Sequences Over Polynomial Rings , 2007, ICS@SYNASC.
[2] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[3] Serge Vaudenay,et al. Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation- , 2013, ACNS.
[4] Kennis Chan,et al. Network Security and Communication Engineering : Proceedings of the 2014 International Conference on Network Security and Communication Engineering (NSCE 2014), Hong Kong, December 25-26, 2014 , 2015 .
[5] Shahaboddin Shamshirband,et al. A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach , 2015, Journal of Grid Computing.
[6] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Rajashri Khanai,et al. Addressing mobile Cloud Computing security issues: A survey , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[8] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[9] Shahaboddin Shamshirband,et al. BSS: block-based sharing scheme for secure data storage services in mobile cloud environment , 2014, The Journal of Supercomputing.
[10] Ali A. Ghorbani,et al. Network Anomaly Detection Based on Wavelet Analysis , 2009, EURASIP J. Adv. Signal Process..
[11] Nikolay Shenets,et al. Some Structural and Security Properties of the Modular Secret Sharing , 2008, 2008 10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing.
[12] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[13] Florian Roemer,et al. Comparison of model order selection techniques for high-resolution parameter estimation algorithms , 2009 .
[14] João Costa,et al. Greatest Eigenvalue Time Vector Approach for Blind Detection of Malicious Traffic , 2013 .
[15] Xiaohua Tian,et al. AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System , 2017, IEEE Wireless Communications.
[16] René Mayrhofer. An architecture for secure mobile devices , 2015, Secur. Commun. Networks.
[17] Jian Yang,et al. Provable Data Possession of Resource-constrained Mobile Devices in Cloud Computing , 2011, J. Networks.
[18] Guan-Ming Su,et al. Auction-Based Resource Allocation for Cooperative Video Transmission Protocols over Wireless Networks , 2009, EURASIP J. Adv. Signal Process..
[19] Yong Tang,et al. Trusted Data Sharing over Untrusted Cloud Storage Providers , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.
[20] Samee Ullah Khan,et al. Future Generation Computer Systems ( ) – Future Generation Computer Systems towards Secure Mobile Cloud Computing: a Survey , 2022 .
[21] Yutao Liu,et al. TinMan: eliminating confidential mobile data exposure with security oriented offloading , 2015, EuroSys.
[22] Chin-Tser Huang,et al. Signal Processing Applications in Network Intrusion Detection Systems , 2009, EURASIP Journal on Advances in Signal Processing.
[23] T. V. Lakshman,et al. Design and Architecture of a Software Defined Proximity Cloud , 2015 .
[24] Mohammad Heydari,et al. An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client–Client Networks , 2016, Wirel. Pers. Commun..
[25] Wei Ren,et al. Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing , 2011 .
[26] Tatiana Galibus,et al. Cloud storage security , 2015 .
[27] Ali Chehab,et al. Energy-efficient incremental integrity for securing storage in mobile cloud computing , 2010, 2010 International Conference on Energy Aware Computing.