Resource Sharing Security in Cloud Computing Environment
暂无分享,去创建一个
[1] Salah M. El-Sayed,et al. Developing and Evaluation of New Hybrid Encryption Algorithms , 2014, BIOINFORMATICS 2014.
[3] Salah M. El-Sayed,et al. Elastic framework for augmenting the performance of mobile applications using cloud computing , 2013, 2013 9th International Computer Engineering Conference (ICENCO).
[4] Sunil Kumar,et al. Security Issues in Mobile Ad Hoc Networks: A Survey , 2016 .
[5] Bo Li,et al. Gearing resource-poor mobile devices with powerful clouds: architectures, challenges, and applications , 2013, IEEE Wireless Communications.
[6] Henri E. Bal,et al. Ibis for mobility: solving challenges of mobile computing using grid techniques , 2009, HotMobile '09.
[7] Mais Nijim,et al. Survey on Three Components of Mobile Cloud Computing: Offloading, Distribution and Privacy , 2017 .
[8] Jiafu Wan,et al. Security and privacy in mobile cloud computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[9] Mohey M. Hadhoud,et al. Wireless Network Security Still Has no Clothes , 2011, Int. Arab. J. e Technol..
[10] Gernot Heiser,et al. An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.
[11] Athanasios V. Vasilakos,et al. SeDaSC: Secure Data Sharing in Clouds , 2017, IEEE Systems Journal.
[12] Rajkumar Buyya,et al. Heterogeneity in Mobile Cloud Computing: Taxonomy and Open Challenges , 2014, IEEE Communications Surveys & Tutorials.
[13] Gustavo Alonso,et al. Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications , 2009, Middleware.
[14] E. Wadhwa,et al. Performance Comparison of Single and Multipath Routing Protocols in Adhoc Networks , 2011 .
[15] Chonho Lee,et al. A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..
[16] Salah M. El-Sayed,et al. Increasing The Performance Of Mobile Smartphones Using Partition And Migration Of Mobile Applications To Cloud Computing , 2014 .
[17] Feng Xia,et al. Context-Aware Mobile Cloud Computing and Its Challenges , 2015, IEEE Cloud Computing.
[18] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[19] Rajkumar Buyya,et al. Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges , 2013, IEEE Communications Surveys & Tutorials.
[20] Mazliza Othman,et al. A Survey of Mobile Cloud Computing Application Models , 2014, IEEE Communications Surveys & Tutorials.
[21] Feng Xia,et al. Rich Mobile Applications: Genesis, taxonomy, and open issues , 2014, J. Netw. Comput. Appl..
[22] Gurjeet Singh,et al. Security Threats and Maintaince in Mobile Adhoc Networks , 2011 .
[23] Darshan Bhole,et al. A New Security Protocol Using Hybrid Cryptography Algorithms , 2016 .