-
1
-
-
84055190116
-
A survey of research on mobile cloud computing
-
16-18 May
-
L. Guan, X. Ke, M. Song, and J. Song, "A survey of research on mobile cloud computing," IEEE 1 Oth International Conference on Computer and Information Science (ICIS), pp.387-392, 16-18 May 2011.
-
(2011)
IEEE 10th International Conference on Computer and Information Science (ICIS)
, pp. 387-392
-
-
Guan, L.1
Ke, X.2
Song, M.3
Song, J.4
-
2
-
-
80051864257
-
Cloud computing and its key techniques
-
1O-l2 June
-
X. Wang, B. Wang, and J. Huang, "Cloud computing and its key techniques," IEEE International Conference on Computer Science and Automation Engineering (CSAE), vol. 2, pp. 404-410, 1O-l2 June 2011.
-
(2011)
IEEE International Conference on Computer Science and Automation Engineering (CSAE)
, vol.2
, pp. 404-410
-
-
Wang, X.1
Wang, B.2
Huang, J.3
-
3
-
-
84908627391
-
-
"Mobile Cloud Applications " [Online] Available: https://www.abiresearch.comlresearch/productll 005283-mobile-cloud-applications/
-
-
-
Mobile Cloud Applications1
-
4
-
-
84908645668
-
Security threats on cloud computing vulnerabilities
-
June
-
T. S. Chou, "Security threats on cloud computing vulnerabilities," International Journal of Computer Science & Information Technology (IJCSIT), vol. 5, no. 3, pp.79-88, June 2013.
-
(2013)
International Journal of Computer Science & Information Technology (IJCSIT)
, vol.5
, Issue.3
, pp. 79-88
-
-
Chou, T.S.1
-
5
-
-
70350136710
-
The case for vm-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, "The Case for VM-Based cloudlets in mobile computing," IEEE Pervasive Computing, vol. 8, no. 4, pp. 14-23,2009.
-
(2009)
IEEE Pervasive Computing
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
6
-
-
79960576001
-
SDSM: A secure data service mechanism in mobile cloud computing
-
10-15 April
-
W. Jia, H. Zhu, Z. Cao, L Wei, and X. Lin, "SDSM: A secure data service mechanism in mobile cloud computing," IEEE conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.l060-1065, 10-15 April 2011.
-
(2011)
IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
, pp. 1060-1065
-
-
Jia, W.1
Zhu, H.2
Cao, Z.3
Wei, L.4
Lin, X.5
-
7
-
-
80052421238
-
Secure cloud storage for convenient data archive of smart phones
-
14-17 June
-
S. C. Hsueh, J. Y. Lin, and M. Y. Lin, "Secure cloud storage for convenient data archive of smart phones," IEEE 15th International Symposium on Consumer Electronics (ISCE), pp. 156-161, 14-17 June 2011.
-
(2011)
IEEE 15th International Symposium on Consumer Electronics (ISCE)
, pp. 156-161
-
-
Hsueh, S.C.1
Lin, J.Y.2
Lin, M.Y.3
-
8
-
-
84862956001
-
Eflicient and secure data storage operations for mobile cloud computing
-
ePrint Archive: 185
-
Z. Zhou, and D. Huang, "Eflicient and secure data storage operations for mobile cloud computing," IACR Cryptology, ePrint Archive: 185, 2011
-
(2011)
IACR Cryptology
-
-
Zhou, Z.1
Huang, D.2
-
9
-
-
34548731375
-
Ciphertext-policy attributebased encryption
-
20-23 May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attributebased encryption," IEEE Symposium on Security and Privacy, pp. 321-3 34,20-23 May 2007.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
10
-
-
84874261558
-
DFCloud : A TPM-based Secure data access control method of cloud storage in mobile devices
-
3-6 Dec.
-
J. Shin, Y. Kim, W. Park, and C. Park, "DFCloud : A TPM-based Secure data access control method of cloud storage in mobile devices," IEEE 4th International Conference on Cloud Computing Technology and Science, pp. 551-556,3-6 Dec. 2012.
-
(2012)
IEEE 4th International Conference on Cloud Computing Technology and Science
, pp. 551-556
-
-
Shin, J.1
Kim, Y.2
Park, W.3
Park, C.4
-
11
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
July
-
A. N. Khan, M.L. Kiah, S. U. Khanb, and S. A. Madanic, "Towards secure mobile cloud computing: A survey,"Future Generation Computer Systems, vol. 29, no. 5, pp. 1278-1299, July 2013.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Kiah, M.L.2
Khanb, S.U.3
Madanic, S.A.4
-
12
-
-
84885632536
-
A distributed cloud architecture formobile multimedia services
-
September-October
-
M. Felemban, S. Basalamah, and A. Ghafoor,"A distributed cloud architecture formobile multimedia services," IEEE Network, vol.27, no.5, pp. 20-27, September-October 2013.
-
(2013)
IEEE Network
, vol.27
, Issue.5
, pp. 20-27
-
-
Felemban, M.1
Basalamah, S.2
Ghafoor, A.3
-
13
-
-
84908657984
-
Simple authentication protocols
-
John Wiley and Sons, Inc., Hoboken, New Jersey: Wiley, , ch. 9
-
M. Stamp, "Simple Authentication Protocols," in Infonnation Security Principles and Practices, John Wiley and Sons, Inc., Hoboken, New Jersey: Wiley, 2005, ch. 9, pp. 209-222.
-
(2005)
Infonnation Security Principles and Practices
, pp. 209-222
-
-
Stamp, M.1
-
14
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie, and M.E. Hellman, "New directions in cryptography ", IEEE Transaction on Information Theory, vol. 22, no. 6, pp. 644-654, Nov 1976.
-
(1976)
IEEE Transaction on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
|