-
1
-
-
84868522175
-
A Distributed cache based reliable service execution and recovery approach in MANETs
-
Zhou X, Ge Y, Chen X, Jing Y, Sun W. A Distributed cache based reliable service execution and recovery approach in MANETs. Journal of Convergence 2012; 3(1):5-12.
-
(2012)
Journal of Convergence
, vol.3
, Issue.1
, pp. 5-12
-
-
Zhou, X.1
Ge, Y.2
Chen, X.3
Jing, Y.4
Sun, W.5
-
5
-
-
80755169468
-
Sedic: Privacy-aware data intensive computing on hybrid cloud
-
Zhang K, Zhou X, Chen Y, Wang X, Ruan Y. Sedic: privacy-aware data intensive computing on hybrid cloud. Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
-
-
Zhang, K.1
Zhou, X.2
Chen, Y.3
Wang, X.4
Ruan, Y.5
-
6
-
-
84922210343
-
Depot: Cloud storage with minimal trust
-
Alvisi L, Clement A, Dahlin M, Lee S, Mahajan P, Setty S, Walfish M. Depot: cloud storage with minimal trust. USENIX Symposium on Operating Systems Design and Implementation, 2010.
-
USENIX Symposium on Operating Systems Design and Implementation, 2010
-
-
Alvisi, L.1
Clement, A.2
Dahlin, M.3
Lee, S.4
Mahajan, P.5
Setty, S.6
Walfish, M.7
-
7
-
-
82655182920
-
Logical attestation:An authorization architecture for trustworthy computing
-
Sier EG, Bruijn W, Reynolds P, Shieh A, Walsh K, Williams D, Schneider FB. Logical attestation:an authorization architecture for trustworthy computing. Proceedings of 23rd ACM Symposium on Operating Systems Principles, 2011.
-
Proceedings of 23rd ACM Symposium on Operating Systems Principles, 2011
-
-
Sier, E.G.1
Bruijn, W.2
Reynolds, P.3
Shieh, A.4
Walsh, K.5
Williams, D.6
Schneider, F.B.7
-
8
-
-
84881388540
-
Strong roaming authentication technique for wireless and mobile networks
-
He D, Chen C, Chan S, Bu J. Strong roaming authentication technique for wireless and mobile networks. International Journal of Communication Systems 2013; 26(8):1028-1037.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.8
, pp. 1028-1037
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
-
10
-
-
84876156693
-
Provable secure proxy signature scheme without bilinear pairings
-
Tiwari N, Padhye S. Provable secure proxy signature scheme without bilinear pairings. International Journal of Communication Systems 2013; 26(5):644-650.
-
(2013)
International Journal of Communication Systems
, vol.26
, Issue.5
, pp. 644-650
-
-
Tiwari, N.1
Padhye, S.2
-
11
-
-
55149108173
-
Flicker: An execution infrastructure for TCB minimization
-
McCune JM, Parno B, Perrig A, Reiter MK, Isozaki H. Flicker: an execution infrastructure for TCB minimization. Proceedings of the European Conference on Computer Systems, 2008.
-
Proceedings of the European Conference on Computer Systems, 2008
-
-
McCune, J.M.1
Parno, B.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
12
-
-
67650799825
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen X, Garfinkel T, Lewis EC, Subrahmanyam P, Waldspurger CA, Boneh D, Dwoskin J, Ports DRK. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008.
-
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
Waldspurger, C.A.5
Boneh, D.6
Dwoskin, J.7
Ports, D.R.K.8
-
13
-
-
84870755389
-
-
Android open source project. Available from: Accessed on December 5, 2012
-
Android security overview. Android open source project. (Available from: http://source.android.com/tech/security/index.html). Accessed on December 5, 2012
-
Android Security Overview
-
-
-
14
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
Khan AN, Kiah MLM, Khan SU, Madani SA. Towards secure mobile cloud computing: a survey. Future Generation Computer Systems 2013; 29(5):1278-1299.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Kiah, M.L.M.2
Khan, S.U.3
Madani, S.A.4
-
16
-
-
78650121432
-
Authentication in the clouds: A framework and its application to mobile users
-
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, Song Z. Authentication in the clouds: a framework and its application to mobile users. Proceedings of ACM Cloud Computing Security Workshop (CCSW '10), Chicago, USA, 2010.
-
Proceedings of ACM Cloud Computing Security Workshop (CCSW '10), Chicago, USA, 2010
-
-
Chow, R.1
Jakobsson, M.2
Masuoka, R.3
Molina, J.4
Niu, Y.5
Shi, E.6
Song, Z.7
-
17
-
-
78449236807
-
MobiCloud: Building secure cloud framework for mobile computing and communication
-
Huang D, Zhang X, Kang M, Luo J. MobiCloud: building secure cloud framework for mobile computing and communication. Proceedings of the 5th IEEE International Symposium on Service Oriented System Engineering (SOSE '10), Nanjing, China, 2010.
-
Proceedings of the 5th IEEE International Symposium on Service Oriented System Engineering (SOSE '10), Nanjing, China, 2010
-
-
Huang, D.1
Zhang, X.2
Kang, M.3
Luo, J.4
-
18
-
-
84873809828
-
Mobile biometrics: Combined face and voice verification for a mobile platform
-
Tresadern P, Cootes TF, Poh N, Matejka P, Hadid A, Lévy C, McCool C, Marcel S. Mobile biometrics: combined face and voice verification for a mobile platform. Pervasive Computing, IEEE 2013; 12(1):79-87.
-
(2013)
Pervasive Computing, IEEE
, vol.12
, Issue.1
, pp. 79-87
-
-
Tresadern, P.1
Cootes, T.F.2
Poh, N.3
Matejka, P.4
Hadid, A.5
Lévy, C.6
McCool, C.7
Marcel, S.8
-
19
-
-
80755187832
-
Unicorn: Two-factor attestation for data security
-
Mannan M, Kim BH, Ganjali A, Lie D. Unicorn: two-factor attestation for data security. Proceedings of the 18th ACM conference on Computer and Communications Security, 2011; 17-28.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
, pp. 17-28
-
-
Mannan, M.1
Kim, B.H.2
Ganjali, A.3
Lie, D.4
|