A Context-Adaptive Security Framework for Mobile Cloud Computing
暂无分享,去创建一个
[1] Hoi-Jun Yoo,et al. A 5.5mW IEEE-802.15.6 wireless body-area-network standard transceiver for multichannel electro-acupuncture application , 2013, 2013 IEEE International Solid-State Circuits Conference Digest of Technical Papers.
[2] Yingxu Wang. Cognitive computing and World Wide Wisdom (WWW+) , 2010, 9th IEEE International Conference on Cognitive Informatics (ICCI'10).
[3] Rick Huhn,et al. Security Standards for the RFID Market , 2005, IEEE Secur. Priv..
[4] Abdelmadjid Bouabdallah,et al. M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.
[5] Lu Chen,et al. Analysis of VANET security based on routing protocol information , 2013, 2013 Fourth International Conference on Intelligent Control and Information Processing (ICICIP).
[6] Tsong-Ho Wu. A passive protected self-healing mesh network architecture and applications , 1994, TNET.
[7] Zhibin Zhou,et al. Secure data processing framework for mobile cloud computing , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[8] Akhil Behl. Emerging security challenges in cloud computing: An insight to cloud security challenges and their mitigation , 2011, 2011 World Congress on Information and Communication Technologies.
[9] Giorgio Metta,et al. Safe and effective learning: A case study , 2010, 2010 IEEE International Conference on Robotics and Automation.
[10] S. S. Chapade,et al. Securing Cloud Servers Against Flooding Based DDOS Attacks , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[11] Chee Siang Ang,et al. Theories of learning: a computer game perspective , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..
[12] Marta Z. Kwiatkowska,et al. PRISM 4.0: Verification of Probabilistic Real-Time Systems , 2011, CAV.
[13] T. H. Noh. End-to-end self-healing SDH/ATM networks , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[14] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[15] Leonardo Badia,et al. Cognition-based networks: Applying cognitive science to multimedia wireless networking , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[16] José Manuel Galán,et al. Techniques to Understand Computer Simulations: Markov Chain Analysis , 2009, J. Artif. Soc. Soc. Simul..
[17] Srinivas Sampalli,et al. A security suite for wireless body area networks , 2012, ArXiv.
[18] Qiang Ye,et al. A light-weight authentication scheme based on message digest and location for mobile cloud computing , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[19] Markus Jakobsson,et al. Authentication in the clouds: a framework and its application to mobile users , 2010, CCSW '10.
[20] Kee-Young Yoo,et al. A lightweight multi-user authentication scheme based on cellular automata in cloud environment , 2012, 2012 IEEE 1st International Conference on Cloud Networking (CLOUDNET).
[21] Konstantinos Markantonakis,et al. Considerations for mobile authentication in the Cloud , 2011, Inf. Secur. Tech. Rep..
[22] Eystein Mathisen,et al. Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).