-
1
-
-
78449236807
-
Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication
-
D. Huang, X. Zhang, M. Kang, and J. Luo, "Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication," in Proceedings of 5th IEEE International Symposium on Service-Oriented System Engineering, 2010.
-
(2010)
Proceedings of 5th IEEE International Symposium on Service-Oriented System Engineering
-
-
Huang, D.1
Zhang, X.2
Kang, M.3
Luo, J.4
-
2
-
-
74049131554
-
Resource management for isolation enhanced cloud services
-
H. Raj, R. Nathuji, A. Singh, and P. England, "Resource management for isolation enhanced cloud services," in Proceedings of ACM workshop on Cloud computing security, 2009, pp. 77-84.
-
(2009)
Proceedings of ACM Workshop on Cloud Computing Security
, pp. 77-84
-
-
Raj, H.1
Nathuji, R.2
Singh, A.3
England, P.4
-
3
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds," in ACM Conference on Computer and Communications Security, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
5
-
-
71749106352
-
Deploying mobile computation in cloud service
-
X. H. Li, H. Zhang, and Y. F. Zhang, "Deploying Mobile Computation in Cloud Service," in Proceedings of the First International Conference for Cloud Computing (CloudCom), 2009, p. 301.
-
(2009)
Proceedings of the First International Conference for Cloud Computing (CloudCom)
, pp. 301
-
-
Li, X.H.1
Zhang, H.2
Zhang, Y.F.3
-
6
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Saint Malo, France, Sep
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling public verifiability and data dynamics for storage security in cloud computing," in European Symposium on Research in Computer Security (ESORICS) 2009, Saint Malo, France, Sep 2009.
-
(2009)
European Symposium on Research in Computer Security (ESORICS) 2009
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
7
-
-
77954843911
-
Towards publicly auditably secure data storage services
-
July/August
-
C. Wang, K. Ren, W. Lou, and J. Li, "Towards Publicly Auditably Secure Data Storage Services," IEEE Network Magazine, vol. 24, no. 4, pp. 19-24, July/August 2010.
-
(2010)
IEEE Network Magazine
, vol.24
, Issue.4
, pp. 19-24
-
-
Wang, C.1
Ren, K.2
Lou, W.3
Li, J.4
-
9
-
-
84898487969
-
A game-theoretic method of fair resource allocation for cloud computing services
-
G. Wei, A. V. Vasilakos, Y. Zheng, and N. Xiong, "A game-theoretic method of fair resource allocation for cloud computing services," The Journal of Supercomputing, vol. 54, no. 2, pp. 252-269, 2009.
-
(2009)
The Journal of Supercomputing
, vol.54
, Issue.2
, pp. 252-269
-
-
Wei, G.1
Vasilakos, A.V.2
Zheng, Y.3
Xiong, N.4
-
10
-
-
62249162882
-
Resource management and QoS provisioning for IPTV over mmWave-based WPANs with directional antenna
-
L. X. Cai, L. Cai, X. Shen, and J. W. Mark, "Resource management and QoS provisioning for IPTV over mmWave-based WPANs with directional antenna," ACM Mobile Networks and Applications (MONET), vol. 14, no. 2, pp. 210-219, 2009.
-
(2009)
ACM Mobile Networks and Applications (MONET)
, vol.14
, Issue.2
, pp. 210-219
-
-
Cai, L.X.1
Cai, L.2
Shen, X.3
Mark, J.W.4
-
11
-
-
61349091199
-
Novel packet-level resource allocation with effective QoS provisioning for wireless mesh networks
-
Feb
-
H. T. Cheng and W. Zhuang, "Novel packet-level resource allocation with effective QoS provisioning for wireless mesh networks," IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp. 694-700, Feb 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.2
, pp. 694-700
-
-
Cheng, H.T.1
Zhuang, W.2
-
12
-
-
67651083321
-
Efficient MAC protocol for ultrawideband networks
-
L. X. Cai, X. Shen, and J. W. Mark, "Efficient MAC Protocol for Ultrawideband Networks," IEEE Communications Magazine, vol. 47, no. 6, pp. 179-185, 2009.
-
(2009)
IEEE Communications Magazine
, vol.47
, Issue.6
, pp. 179-185
-
-
Cai, L.X.1
Shen, X.2
Mark, J.W.3
-
14
-
-
74049093526
-
Controlling data in the cloud: Outsourcing computation without outsourcing control
-
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, "Controlling data in the cloud: outsourcing computation without outsourcing control," in Proceedings of the 2009 ACM workshop on Cloud computing security, 2009, pp. 85-90.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 85-90
-
-
Chow, R.1
Golle, P.2
Jakobsson, M.3
Shi, E.4
Staddon, J.5
Masuoka, R.6
Molina, J.7
-
15
-
-
78449254291
-
Browser interfaces and extended validation SSL certificates: An empirical study
-
J. Sobey, T. Whalen, R. Biddle, P. V. Oorschot, and A. Patrick, "Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study," in Proceedings of the 2009 ACM workshop on Cloud computing security, 2009.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
-
-
Sobey, J.1
Whalen, T.2
Biddle, R.3
Oorschot, P.V.4
Patrick, A.5
|