A Mobile Device-Based Virtualization Technique for M2M Communication in Cloud Computing Security
暂无分享,去创建一个
[1] Gernot Heiser,et al. The role of virtualization in embedded systems , 2008, IIES '08.
[2] Jaewoo Chung,et al. Mobile Computing Systems and Applications , 2011, IEEE Pervasive Comput..
[3] Thomas Kunz,et al. A mobile code toolkit for adaptive mobile applications , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.
[4] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[5] Geoffrey H. Kuenning,et al. The remote processing framework for portable computer power saving , 1999, SAC '99.
[6] Sang-Bum Suh,et al. Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[7] Martin Botteck,et al. Virtualization as an enabler for security in mobile devices , 2008, IIES '08.
[8] Kang G. Shin,et al. On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.
[9] Peter M. Chen,et al. Pocket Hypervisors: Opportunities and Challenges , 2007 .
[10] Farnam Jahanian,et al. CloudAV: N-Version Antivirus in the Network Cloud , 2008, USENIX Security Symposium.
[11] Jason Flinn,et al. quFiles: a unifying abstraction for mobile data management , 2008, HotMobile '08.