-
1
-
-
84869193534
-
MOMCC: Market-oriented architecture for mobile cloud computing based on service oriented architecture
-
Beijing, China: IEEE Computer Society
-
Abolfazli S, Sanaei Z, Shiraz M, Gani A. MOMCC: market-oriented architecture for mobile cloud computing based on service oriented architecture. In: 1st IEEE international conference on communications in china workshops. Beijing, China: IEEE Computer Society; 2012. p. 8-13. doi: http://dx.doi.org/10.1109/ICCCW.2012.6316481.
-
(2012)
1st IEEE International Conference on Communications in China Workshops
, pp. 8-113
-
-
Abolfazli, S.1
Sanaei, Z.2
Shiraz, M.3
Gani, A.4
-
2
-
-
84898022359
-
An experimental analysis on cloud-based mobile augmentation in mobile cloud computing
-
S. Abolfazli, Z. Sanaei, M.M. Alizadeh, A. Gani, F. Xia, and S. Member An experimental analysis on cloud-based mobile augmentation in mobile cloud computing IEEE Trans Consum Electron 99 1 2014 1 9
-
(2014)
IEEE Trans Consum Electron
, vol.99
, Issue.1
, pp. 1-9
-
-
Abolfazli, S.1
Sanaei, Z.2
Alizadeh, M.M.3
Gani, A.4
Xia, F.5
Member, S.6
-
3
-
-
84894646273
-
Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges
-
S. Abolfazli, Z. Sanaei, E. Ahmed, A. Gani, and R. Buyya Cloud-based augmentation for mobile devices: motivation, taxonomies, and open challenges IEEE Commun Surv Tutor 16 1 2014 337 368 10.1109/SURV.2013.070813.00285
-
(2014)
IEEE Commun Surv Tutor
, vol.16
, Issue.1
, pp. 337-368
-
-
Abolfazli, S.1
Sanaei, Z.2
Ahmed, E.3
Gani, A.4
Buyya, R.5
-
4
-
-
84896313884
-
Rich mobile applications: Genesis, taxonomy, and open issues
-
S. Abolfazli, Z. Sanaei, A. Gani, F. Xia, and L.T. Yang Rich mobile applications: genesis, taxonomy, and open issues J Netw Comput Appl 40 April 2014 345 362 10.1016/j.jnca.2013.09.009
-
(2014)
J Netw Comput Appl
, vol.40
, Issue.April
, pp. 345-362
-
-
Abolfazli, S.1
Sanaei, Z.2
Gani, A.3
Xia, F.4
Yang, L.T.5
-
5
-
-
32144463658
-
Authentication protocols for ad hoc networks: Taxonomy and research issues
-
Montreal, Canada: ACM
-
Aboudagga N, Refaei MT, Eltoweissy M, DaSilva LA, Quisquater J-J. Authentication protocols for ad hoc networks: taxonomy and research issues. In: Proceedings of the 1st ACM international workshop on quality of service and security in wireless and mobile networks. Montreal, Canada: ACM; 2005. p. 96-104. http://dx.doi.org/10.1145/1089761.1089777.
-
(2005)
Proceedings of the 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
, pp. 96-104
-
-
Aboudagga, N.1
Refaei, M.T.2
Eltoweissy, M.3
DaSilva, L.A.4
Quisquater, J.-J.5
-
7
-
-
80052396077
-
User authentication platform using provisioning in cloud computing environment
-
Brno, Czech republic: Springer-Verlag
-
Ahn H, Chang H, Jang C, Choi E. User authentication platform using provisioning in cloud computing environment. In: 3rd international conference on advanced communication and networking. Brno, Czech republic: Springer-Verlag; 2011. p. 132-8. doi: http://dx.doi.org/10.1007/978-3-642-23312-8-16.
-
(2011)
3rd International Conference on Advanced Communication and Networking
, pp. 132-138
-
-
Ahn, H.1
Chang, H.2
Jang, C.3
Choi, E.4
-
8
-
-
84914666586
-
Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR
-
M. Aiash, and J. Loo Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR Int J Commun Syst 27 12 2013 3600 3618 10.1002/dac.2561
-
(2013)
Int J Commun Syst
, vol.27
, Issue.12
, pp. 3600-3618
-
-
Aiash, M.1
Loo, J.2
-
10
-
-
84904431043
-
A brief review of mobile cloud computing opportunities
-
M. Alizadeh, W.H. Hassan, N. Behboodian, and S. Karamizadeh A brief review of mobile cloud computing opportunities Res Notes Inf Sci 12 April 2013 155 160 10.4156/rnis.vol12.27
-
(2013)
Res Notes Inf Sci
, vol.12
, Issue.April
, pp. 155-160
-
-
Alizadeh, M.1
Hassan, W.H.2
Behboodian, N.3
Karamizadeh, S.4
-
11
-
-
84904163302
-
A prospective study of mobile cloud computing
-
M. Alizadeh, W.H. Hassan, M. Zamani, T. Khodadadi, and S.S. Chaeikar A prospective study of mobile cloud computing Int J Adv Comput Technol 5 11 2013
-
(2013)
Int J Adv Comput Technol
, vol.5
, Issue.11
-
-
Alizadeh, M.1
Hassan, W.H.2
Zamani, M.3
Khodadadi, T.4
Chaeikar, S.S.5
-
12
-
-
84894212054
-
Smartphone information security awareness: A victim of operational pressures
-
S. Allam, S.V. Flowerday, and E. Flowerday Smartphone information security awareness: a victim of operational pressures Comput Secur 42 May 2014 56 65 10.1016/j.cose.2014.01.005
-
(2014)
Comput Secur
, vol.42
, Issue.May
, pp. 56-65
-
-
Allam, S.1
Flowerday, S.V.2
Flowerday, E.3
-
14
-
-
84896334152
-
Mobile cloud computing framework for patients' health data analysis
-
M.A. Al-Zoube, and Y.A. Alqudah Mobile cloud computing framework for patients' health data analysis Biomed Eng: Appl, Basis Commun 26 02 2014 1450020-9. http://dx.doi.org/10.4015/S1016237214500203
-
(2014)
Biomed Eng: Appl, Basis Commun
, vol.26
, Issue.2
, pp. 1450020-1450029
-
-
Al-Zoube, M.A.1
Alqudah, Y.A.2
-
15
-
-
84914158898
-
Mobile storage augmentation in mobile cloud computing: Taxonomy, approaches, and open issues
-
N. Aminzadeh, Z. Sanaei, and S.H. Ab Hamid Mobile storage augmentation in mobile cloud computing: taxonomy, approaches, and open issues Simul Model Pract Theory 50 January 2015 96 108 10.1016/j.simpat.2014.05.009
-
(2015)
Simul Model Pract Theory
, vol.50
, Issue.January
, pp. 96-108
-
-
Aminzadeh, N.1
Sanaei, Z.2
Ab Hamid, S.H.3
-
16
-
-
84933676368
-
An efficient block classification for media healthcare service in mobile cloud computing
-
N. An, C.-T. Huynh, B. Lee, C. Hong, and E.-N. Huh An efficient block classification for media healthcare service in mobile cloud computing Multimed Tools Appl 2014 1 15 10.1007/s11042-014-2039-6
-
(2014)
Multimed Tools Appl
, pp. 1-15
-
-
An, N.1
Huynh, C.-T.2
Lee, B.3
Hong, C.4
Huh, E.-N.5
-
17
-
-
84907207994
-
An anonymous end-to-end communication protocol for mobile cloud environments
-
C.A. Ardagna, M. Conti, M. Leone, and J. Stefa An anonymous end-to-end communication protocol for mobile cloud environments IEEE Trans Serv Comput 7 3 2014 373 386 10.1109/TSC.2014.2304717
-
(2014)
IEEE Trans Serv Comput
, vol.7
, Issue.3
, pp. 373-386
-
-
Ardagna, C.A.1
Conti, M.2
Leone, M.3
Stefa, J.4
-
18
-
-
84923693945
-
Interoperability issues on heterogeneous wireless communication for smart cities
-
E. Avelar, L. Marques, D. dos Passos, R. Macedo, K. Dias, and M. Nogueira Interoperability issues on heterogeneous wireless communication for smart cities Comput Commun 58 March 2015 4 15 10.1016/j.comcom.2014.07.005
-
(2015)
Comput Commun
, vol.58
, Issue.March
, pp. 4-15
-
-
Avelar, E.1
Marques, L.2
Dos Passos, D.3
Macedo, R.4
Dias, K.5
Nogueira, M.6
-
19
-
-
84887982439
-
Enabling dynamic data and indirect mutual trust for cloud computing storage systems
-
A. Barsoum, A. Hasan, and S. Member Enabling dynamic data and indirect mutual trust for cloud computing storage systems IEEE Trans Parallel Distrib Syst 24 12 2013 2375 2385
-
(2013)
IEEE Trans Parallel Distrib Syst
, vol.24
, Issue.12
, pp. 2375-2385
-
-
Barsoum, A.1
Hasan, A.2
Member, S.3
-
20
-
-
84886397776
-
Risk-aware vertical handoff algorithm for security access support in heterogeneous wireless networks
-
Chongqing, China: IEEE
-
Bin M, Xiaofeng L, Xianzhong X. Risk-aware vertical handoff algorithm for security access support in heterogeneous wireless networks. In: 5th international conference on biomedical engineering and informatics. Chongqing, China: IEEE; 2012. p. 1515-9. http://dx.doi.org/10.1109/BMEI.2012.6512937.
-
(2012)
5th International Conference on Biomedical Engineering and Informatics
, pp. 1515-1519
-
-
Bin, M.1
Xiaofeng, L.2
Xianzhong, X.3
-
21
-
-
84878353718
-
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
-
San Francisco, USA: IEEE
-
Bonneau J, Herley C, van Oorschot PC, Stajano F. The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE symposium on security and privacy. San Francisco, USA: IEEE; 2012. p. 553-67. http://dx.doi.org/10.1109/SP.2012.44.
-
(2012)
2012 IEEE Symposium on Security and Privacy
, pp. 553-567
-
-
Bonneau, J.1
Herley, C.2
Van Oorschot, P.C.3
Stajano, F.4
-
23
-
-
38049123111
-
Designing a trade-off between usability and security: A metrics based-model
-
C. Baranauskas, P. Palanque, J. Abascal, S. Barbosa, Springer Berlin, Heidelberg
-
C. Braz, A. Seffah, and D. MRaihi Designing a trade-off between usability and security: a metrics based-model C. Baranauskas, P. Palanque, J. Abascal, S. Barbosa, Human-computer interaction. Lecture notes in computer Science vol. 4663 2007 Springer Berlin, Heidelberg 114 126 10.1007/978-3-540-74800-7-9
-
(2007)
Human-computer Interaction. Lecture Notes in Computer Science
, vol.4663
, pp. 114-126
-
-
Braz, C.1
Seffah, A.2
MRaihi, D.3
-
24
-
-
82455221304
-
A cloud you can trust
-
C. Cachin, and M. Schunter A cloud you can trust IEEE Spectrum 48 12 2011 28 51
-
(2011)
IEEE Spectrum
, vol.48
, Issue.12
, pp. 28-51
-
-
Cachin, C.1
Schunter, M.2
-
26
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
C.-C. Chang, C.-Y. Lee, and Y.-C. Chiu Enhanced authentication scheme with anonymity for roaming service in global mobility networks Comput Commun 32 4 2009 611 618 10.1016/j.comcom.2008.11.032
-
(2009)
Comput Commun
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.-C.1
Lee, C.-Y.2
Chiu, Y.-C.3
-
27
-
-
84897715339
-
Addressing data and user mobility challenges in the cloud
-
Santa Clara, USA: IEEE
-
Chen L, Hoang DB. Addressing data and user mobility challenges in the cloud. In: 2013 IEEE sixth international conference on cloud computing. Santa Clara, USA: IEEE; 2013. p. 549-56. http://dx.doi.org/10.1109/CLOUD.2013.26.
-
(2013)
2013 IEEE Sixth International Conference on Cloud Computing
, pp. 549-556
-
-
Chen, L.1
Hoang, D.B.2
-
28
-
-
84885915860
-
Mobile learning system based on cloud computing
-
M. Chen, Y. Ma, Y. Liu, F. Jia, Y. Ran, and J. Wang Mobile learning system based on cloud computing J Netw 8 11 2013 2572 2577 10.4304/jnw.8.11.2572-2577
-
(2013)
J Netw
, vol.8
, Issue.11
, pp. 2572-2577
-
-
Chen, M.1
Ma, Y.2
Liu, Y.3
Jia, F.4
Ran, Y.5
Wang, J.6
-
29
-
-
78650121432
-
Authentication in the clouds: A framework and its application to mobile users
-
Chicago, USA: ACM
-
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Shi E, et al. Authentication in the clouds: a framework and its application to mobile users. In: Proceedings of the 2010 ACM workshop on cloud computing security workshop. Chicago, USA: ACM; 2010. p. 1-6. http://dx.doi.org/10.1145/1866835.1866837.
-
(2010)
Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop
, pp. 1-6
-
-
Chow, R.1
Jakobsson, M.2
Masuoka, R.3
Molina, J.4
Niu, Y.5
Shi, E.6
-
31
-
-
84870184323
-
Secure data transmission with cloud computing in heterogeneous wireless networks
-
C.-H. Chu, Y.-C. Ouyang, and C.-B. Jang Secure data transmission with cloud computing in heterogeneous wireless networks Secur Commun Netw 5 12 2012 1325 1336 10.1002/sec.409
-
(2012)
Secur Commun Netw
, vol.5
, Issue.12
, pp. 1325-1336
-
-
Chu, C.-H.1
Ouyang, Y.-C.2
Jang, C.-B.3
-
33
-
-
33847652928
-
Advanced user authentication for mobile devices
-
N.L. Clarke, and S.M. Furnell Advanced user authentication for mobile devices Comput Secur 26 2 2007 109 119 10.1016/j.cose.2006.08.008
-
(2007)
Comput Secur
, vol.26
, Issue.2
, pp. 109-119
-
-
Clarke, N.L.1
Furnell, S.M.2
-
34
-
-
0036276843
-
Acceptance of subscriber authentication methods for mobile telephony devices
-
N.L. Clarke, S.M. Furnell, P.M. Rodwell, and P.L. Reynolds Acceptance of subscriber authentication methods for mobile telephony devices Comput Secur 21 3 2002 220 228 10.1016/S0167-4048(02)00304-8
-
(2002)
Comput Secur
, vol.21
, Issue.3
, pp. 220-228
-
-
Clarke, N.L.1
Furnell, S.M.2
Rodwell, P.M.3
Reynolds, P.L.4
-
35
-
-
84888866054
-
A framework for continuous, transparent mobile device authentication
-
H. Crawford, K. Renaud, and T. Storer A framework for continuous, transparent mobile device authentication Comput Secur 39 Part B, November 2013 127 136 10.1016/j.cose.2013.05.005
-
(2013)
Comput Secur
, vol.39
, Issue.November
, pp. 127-136
-
-
Crawford, H.1
Renaud, K.2
Storer, T.3
-
37
-
-
79960590319
-
Secure data processing framework for mobile cloud computing
-
Shanghai, China: IEEE
-
Dijiang H, Zhibin Z, Le X, Tianyi X, Yunji Z. Secure data processing framework for mobile cloud computing. In: 2011 IEEE conference on computer communications workshops. Shanghai, China: IEEE; 2011. p. 614-8. http://dx.doi.org/10.1109/INFCOMW.2011.5928886.
-
(2011)
2011 IEEE Conference on Computer Communications Workshops
, pp. 614-618
-
-
Dijiang, H.1
Zhibin, Z.2
Le, X.3
Tianyi, X.4
Yunji, Z.5
-
39
-
-
84888322916
-
A survey of mobile cloud computing: Architecture, applications and approaches
-
H.T. Dinh, C. Lee, D. Niyato, and P. Wang A survey of mobile cloud computing: architecture, applications and approaches Wirel Commun Mob Comput 13 18 2013 1587 1611
-
(2013)
Wirel Commun Mob Comput
, vol.13
, Issue.18
, pp. 1587-1611
-
-
Dinh, H.T.1
Lee, C.2
Niyato, D.3
Wang, P.4
-
40
-
-
83255181843
-
Shallow analysis of mobile learning environment under Cloud computing
-
Switzerland, Kuala Lumpur, Malaysia: Trans Tech Publications
-
Dong J, Han J, Liu J, Yin H. Shallow analysis of mobile learning environment under Cloud computing. In: 2011 7th international conference on MEMS, NANO and smart systems. Switzerland, Kuala Lumpur, Malaysia: Trans Tech Publications; 2012. p. 1447-50. http://dx.doi.org/10.4028/www.scientific.net/AMR.403-408.1447.
-
(2012)
2011 7th International Conference on MEMS, NANO and Smart Systems
, pp. 1447-1450
-
-
Dong, J.1
Han, J.2
Liu, J.3
Yin, H.4
-
42
-
-
84929587517
-
On security in publish/subscribe services: A survey
-
Esposito C, Ciampi M. On security in publish/subscribe services: a survey. IEEE Commun Surv Tutor 2015; PP (99). http://dx.doi.org/10.1109/COMST.2014.2364616.
-
(2015)
IEEE Commun Surv Tutor
, pp. 99
-
-
Esposito, C.1
Ciampi, M.2
-
45
-
-
0033633028
-
Authentication and supervision: A survey of user attitudes
-
S.M. Furnell, P.S. Dowland, H.M. Illingworth, and P.L. Reynolds Authentication and supervision: a survey of user attitudes Comput Secur 19 6 2000 529 539 10.1016/S0167-4048(00)06027-2
-
(2000)
Comput Secur
, vol.19
, Issue.6
, pp. 529-539
-
-
Furnell, S.M.1
Dowland, P.S.2
Illingworth, H.M.3
Reynolds, P.L.4
-
46
-
-
49849102834
-
Beyond the PIN: Enhancing user authentication for mobile devices
-
S. Furnell, N. Clarke, and S. Karatzouni Beyond the PIN: enhancing user authentication for mobile devices Comput Fraud Secur 2008 8 2008 12 17 10.1016/S1361-3723(08)70127-1
-
(2008)
Comput Fraud Secur
, vol.2008
, Issue.8
, pp. 12-17
-
-
Furnell, S.1
Clarke, N.2
Karatzouni, S.3
-
47
-
-
84901446600
-
A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
-
A. Gani, G.M. Nayeem, M. Shiraz, M. Sookhak, M. Whaiduzzaman, and S. Khan A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing J Netw Comput Appl 43 August 2014 84 102 10.1016/j.jnca.2014.04.009
-
(2014)
J Netw Comput Appl
, vol.43
, Issue.August
, pp. 84-102
-
-
Gani, A.1
Nayeem, G.M.2
Shiraz, M.3
Sookhak, M.4
Whaiduzzaman, M.5
Khan, S.6
-
49
-
-
84904126030
-
I sensed it was you: Authenticating mobile users with sensor-enhanced keystroke dynamics
-
S. Dietrich, Springer International Publishing Egham, London, UK
-
C. Giuffrida, K. Majdanik, M. Conti, and H. Bos I sensed it was you: authenticating mobile users with sensor-enhanced keystroke dynamics S. Dietrich, Detection of intrusions and malware and vulnerability assessment SE - 6. Lecture notes in computer science vol. 8550 2014 Springer International Publishing Egham, London, UK 92 111 10.1007/978-3-319-08509-8-6
-
(2014)
Detection of Intrusions and Malware and Vulnerability Assessment SE - 6. Lecture Notes in Computer Science
, vol.8550
, pp. 92-111
-
-
Giuffrida, C.1
Majdanik, K.2
Conti, M.3
Bos, H.4
-
51
-
-
80054816611
-
Security analysis of authentication protocols for next-generation mobile and CE cloud services
-
Berlin, Germany: IEEE
-
Grzonkowski S, Corcoran PM, Coughlin T. Security analysis of authentication protocols for next-generation mobile and CE cloud services. In: 2011 IEEE international conference on consumer electronics. Berlin, Germany: IEEE; 2011. p. 83-7. http://dx.doi.org/10.1109/ICCE-Berlin.2011.6031855.
-
(2011)
2011 IEEE International Conference on Consumer Electronics
, pp. 83-87
-
-
Grzonkowski, S.1
Corcoran, P.M.2
Coughlin, T.3
-
52
-
-
84873442213
-
Authentication using graphical password in cloud
-
Taipei, Taiwan: IEEE Computer Society
-
Guo M-H, Liaw H-T, Hsiao L-L, Huang C-Y, Yen C-T. Authentication using graphical password in cloud. In: 15th international symposium on wireless personal multimedia communications. Taipei, Taiwan: IEEE Computer Society; 2012. p. 177-81.
-
(2012)
15th International Symposium on Wireless Personal Multimedia Communications
, pp. 177-181
-
-
Guo, M.-H.1
Liaw, H.-T.2
Hsiao, L.-L.3
Huang, C.-Y.4
Yen, C.-T.5
-
53
-
-
78751648745
-
A strong user authentication scheme with smart cards for wireless communications
-
D. He, M. Ma, Y. Zhang, C. Chen, and J. Bu A strong user authentication scheme with smart cards for wireless communications Comput Commun 34 3 2011 367 374 10.1016/j.comcom.2010.02.031
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 367-374
-
-
He, D.1
Ma, M.2
Zhang, Y.3
Chen, C.4
Bu, J.5
-
54
-
-
84924912680
-
User privacy and data trustworthiness in mobile crowd sensing
-
D. He, S. Chan, and M. Guizani User privacy and data trustworthiness in mobile crowd sensing IEEE Wirel Commun 22 1 2015 28 34 10.1109/MWC.2015.7054716
-
(2015)
IEEE Wirel Commun
, vol.22
, Issue.1
, pp. 28-34
-
-
He, D.1
Chan, S.2
Guizani, M.3
-
55
-
-
84924860324
-
Mobile application security: Malware threats and defenses
-
D. He, S. Chan, and M. Guizani Mobile application security: malware threats and defenses IEEE Wirele Commun 22 1 2015 138 144 10.1109/MWC.2015.7054729
-
(2015)
IEEE Wirele Commun
, vol.22
, Issue.1
, pp. 138-144
-
-
He, D.1
Chan, S.2
Guizani, M.3
-
57
-
-
84896907019
-
Security protection between users and the mobile media cloud
-
W. Honggang, W. Shaoen, C. Min, and W. Wei Security protection between users and the mobile media cloud IEEE Commun Mag 52 3 2014 73 79 10.1109/MCOM.2014.6766088
-
(2014)
IEEE Commun Mag
, vol.52
, Issue.3
, pp. 73-79
-
-
Honggang, W.1
Shaoen, W.2
Min, C.3
Wei, W.4
-
58
-
-
80053093060
-
The study of mobile education development based on 3G technique and cloud computing
-
Kuala Lumpur, Malaysia: IEEE
-
Huang B. The study of mobile education development based on 3G technique and cloud computing. In: 2011 international conference on uncertainty reasoning and knowledge engineering. Kuala Lumpur, Malaysia: IEEE; 2011. p. 86-9. http://dx.doi.org/10.1109/URKE.2011.6007847.
-
(2011)
2011 International Conference on Uncertainty Reasoning and Knowledge Engineering
, pp. 86-89
-
-
Huang, B.1
-
59
-
-
84883726912
-
Security and privacy in mobile cloud computing
-
Sardinia, Italy: IEEE
-
Hui S, Zhuohua L, Jiafu W, Keliang Z, Security and privacy in mobile cloud computing. In: 2013 9th international on wireless communications and mobile computing conference. Sardinia, Italy: IEEE; 2013. p. 655-9. http://dx.doi.org/10.1109/IWCMC.2013.6583635.
-
(2013)
2013 9th International on Wireless Communications and Mobile Computing Conference
, pp. 655-659
-
-
Hui, S.1
Zhuohua, L.2
Jiafu, W.3
Keliang, Z.4
-
60
-
-
0002499712
-
Introduction to mobile computing
-
T. Imielinski, K.F. Henry, Springer US [Chapter 1]
-
T. Imielinski, and H. Korth Introduction to mobile computing T. Imielinski, K.F. Henry, Mobile computing, the Kluwer international series in engineering and computer science vol. 353 1996 Springer US 1 43 [Chapter 1]. URL http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf
-
(1996)
Mobile Computing, the Kluwer International Series in Engineering and Computer Science
, vol.353
, pp. 1-43
-
-
Imielinski, T.1
Korth, H.2
-
62
-
-
79952030338
-
Energy-efficient incremental integrity for securing storage in mobile cloud computing
-
Cairo, Egypt: IEEE
-
Itani W, Kayssi A, Chehab A. Energy-efficient incremental integrity for securing storage in mobile cloud computing. In: 2010 international conference on energy aware computing. Cairo, Egypt: IEEE; 2010. p. 1-2. http://dx.doi.org/10.1109/ICEAC.2010.5702296.
-
(2010)
2010 International Conference on Energy Aware Computing
, pp. 1-2
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
63
-
-
84894461122
-
Efficient management of security and privacy issues in mobile cloud environment
-
Mumbai, India: IEEE
-
Jana D, Bandyopadhyay D. Efficient management of security and privacy issues in mobile cloud environment. In: 2013 annual IEEE india conference. Mumbai, India: IEEE; 2013. p. 1-6. http://dx.doi.org/10.1109/INDCON.2013.6726077.
-
(2013)
2013 Annual IEEE India Conference
, pp. 1-6
-
-
Jana, D.1
Bandyopadhyay, D.2
-
64
-
-
81255206719
-
The study on a threat countermeasure of mobile cloud services
-
E.Y. Jang, H.J. Kim, C.S. Park, J.Y. Kim, and J. Lee The study on a threat countermeasure of mobile cloud services Korea Inst Inf Secur Cryptol 21 1 2011
-
(2011)
Korea Inst Inf Secur Cryptol
, vol.21
, Issue.1
-
-
Jang, E.Y.1
Kim, H.J.2
Park, C.S.3
Kim, J.Y.4
Lee, J.5
-
65
-
-
84922233101
-
An efficient authentication system of smart device using multi factors in mobile cloud service architecture
-
Y.-S. Jeong, J.S. Park, and J.H. Park An efficient authentication system of smart device using multi factors in mobile cloud service architecture Int J Commun Syst 28 4 2015 659 674 10.1002/dac.2694
-
(2015)
Int J Commun Syst
, vol.28
, Issue.4
, pp. 659-674
-
-
Jeong, Y.-S.1
Park, J.S.2
Park, J.H.3
-
66
-
-
84876756234
-
A study of secure data transmissions in mobile cloud computing from the energy consumption side
-
Bangkok, Thailand: IEEE
-
Jin AH, Sangmin S, Namgi K, Byoung-Dai L. A study of secure data transmissions in mobile cloud computing from the energy consumption side. In: 2013 international conference on information networking. Bangkok, Thailand: IEEE; 2013. p. 250-5. http://dx.doi.org/10.1109/ICOIN.2013.6496385.
-
(2013)
2013 International Conference on Information Networking
, pp. 250-255
-
-
Jin, A.H.1
Sangmin, S.2
Namgi, K.3
Byoung-Dai, L.4
-
67
-
-
84890452158
-
A framework for cooperative resource management in mobile cloud computing
-
R. Kaewpuang, D. Niyato, P. Wang, and E. Hossain A framework for cooperative resource management in mobile cloud computing IEEE J Sel Areas Commun 31 12 2013 2685 2700 10.1109/JSAC.2013.131209
-
(2013)
IEEE J Sel Areas Commun
, vol.31
, Issue.12
, pp. 2685-2700
-
-
Kaewpuang, R.1
Niyato, D.2
Wang, P.3
Hossain, E.4
-
68
-
-
84897983792
-
Consolidated identity management system for secure mobile cloud computing
-
I. Khalil, A. Khreishah, and M. Azeem Consolidated identity management system for secure mobile cloud computing Comput Netw 65 June 2014 99 110 10.1016/j.comnet.2014.03.015
-
(2014)
Comput Netw
, vol.65
, Issue.June
, pp. 99-110
-
-
Khalil, I.1
Khreishah, A.2
Azeem, M.3
-
69
-
-
84866668858
-
Towards secure mobile cloud computing: A survey
-
A.N. Khan, M. Mat Kiah, S.U. Khan, and S.A. Madani Towards secure mobile cloud computing: a survey Future Gener Comput Syst 29 5 2013 1278 1299 10.1016/j.future.2012.08.003
-
(2013)
Future Gener Comput Syst
, vol.29
, Issue.5
, pp. 1278-1299
-
-
Khan, A.N.1
Mat Kiah, M.2
Khan, S.U.3
Madani, S.A.4
-
70
-
-
84888011760
-
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing
-
A.N. Khan, M.L. Mat Kiah, S.a. Madani, A.U.R. Khan, and M. Ali Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing J Supercomput 66 3 2013 1687 1706 10.1007/s11227-013-0967-y
-
(2013)
J Supercomput
, vol.66
, Issue.3
, pp. 1687-1706
-
-
Khan, A.N.1
Mat Kiah, M.L.2
Madani, S.A.3
Khan, A.U.R.4
Ali, M.5
-
71
-
-
84893408486
-
A study of incremental cryptography for security schemes in mobile cloud computing environments
-
Kouching, Malaysia: IEEE
-
Khan AN, Kiah MLM, Khan SU, Madani SA, Khan AR. A study of incremental cryptography for security schemes in mobile cloud computing environments. In: 2013 IEEE symposium on wireless technology and applications. Kouching, Malaysia: IEEE; 2013. p. 62-7. http://dx.doi.org/10.1109/ISWTA.2013.6688818.
-
(2013)
2013 IEEE Symposium on Wireless Technology and Applications
, pp. 62-67
-
-
Khan, A.N.1
Kiah, M.L.M.2
Khan, S.U.3
Madani, S.A.4
Khan, A.R.5
-
72
-
-
84901987724
-
Incremental proxy re-encryption scheme for mobile cloud computing environment
-
A. Khan, M.L.M. Kiah, S. Madani, M. Ali, A. Khan, and S. Shamshirband Incremental proxy re-encryption scheme for mobile cloud computing environment J Supercomput 68 2 2014 624 651 10.1007/s11227-013-1055-z
-
(2014)
J Supercomput
, vol.68
, Issue.2
, pp. 624-651
-
-
Khan, A.1
Kiah, M.L.M.2
Madani, S.3
Ali, M.4
Khan, A.5
Shamshirband, S.6
-
73
-
-
51349141735
-
Anonymous and traceable authentication scheme using smart cards
-
Busan, South Korea: IEEE
-
Kim S, Rhee HS, Chun JY, Lee DH. Anonymous and traceable authentication scheme using smart cards. In: International conference on information security and assurance. Busan, South Korea: IEEE; 2008. p. 162-5. http://dx.doi.org/10.1109/ISA.2008.52.
-
(2008)
International Conference on Information Security and Assurance
, pp. 162-165
-
-
Kim, S.1
Rhee, H.S.2
Chun, J.Y.3
Lee, D.H.4
-
74
-
-
84883686657
-
Mobile cloud computing security considerations
-
S.K.V. Ko, J.H. Lee, and S.W. Kim Mobile cloud computing security considerations J Secur Eng 9 2 2012 143 150
-
(2012)
J Secur Eng
, vol.9
, Issue.2
, pp. 143-150
-
-
Ko, S.K.V.1
Lee, J.H.2
Kim, S.W.3
-
75
-
-
84904369720
-
Mobile cloud computing: Standard approach to protecting and securing of mobile cloud ecosystems
-
Wuhan, China: IEEE
-
Kumar R, Rajalakshmi S. Mobile cloud computing: standard approach to protecting and securing of mobile cloud ecosystems. In: 2013 international conference on computer sciences and applications. Wuhan, China: IEEE; 2013. p. 663-9. http://dx.doi.org/10.1109/CSA.2013.161.
-
(2013)
2013 International Conference on Computer Sciences and Applications
, pp. 663-669
-
-
Kumar, R.1
Rajalakshmi, S.2
-
76
-
-
77956382087
-
A survey of mobile phone sensing
-
N.D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A.T. Campbell A survey of mobile phone sensing IEEE Commun Mag 48 9 2010 140 150
-
(2010)
IEEE Commun Mag
, vol.48
, Issue.9
, pp. 140-150
-
-
Lane, N.D.1
Miluzzo, E.2
Lu, H.3
Peebles, D.4
Choudhury, T.5
Campbell, A.T.6
-
78
-
-
84894374966
-
NemoAuth: A mnemonic multimodal approach to mobile user authentication
-
Xi'an, China: IEEE
-
Le Z, Zhang X, Gao Z. NemoAuth: a mnemonic multimodal approach to mobile user authentication. In: 2013 IEEE region 10 conference (31194). Xi'an, China: IEEE; 2013. p. 1-6.
-
(2013)
2013 IEEE Region 10 Conference (31194)
, pp. 1-6
-
-
Le, Z.1
Zhang, X.2
Gao, Z.3
-
79
-
-
84897766928
-
Challenges on wireless heterogeneous networks for mobile cloud computing
-
L. Lei, Z. Zhong, K. Zheng, J. Chen, and H. Meng Challenges on wireless heterogeneous networks for mobile cloud computing IEEE Wirel Commun 20 3 2013 http://dx.doi.org/10.1109/MWC.2013.6549281
-
(2013)
IEEE Wirel Commun
, vol.20
, Issue.3
-
-
Lei, L.1
Zhong, Z.2
Zheng, K.3
Chen, J.4
Meng, H.5
-
80
-
-
84904703469
-
Phased scheduling for resource-constrained mobile devices in mobile cloud computing
-
C. Li, and L. Li Phased scheduling for resource-constrained mobile devices in mobile cloud computing Wirel Person Commun 77 4 2014 2817 2837 10.1007/s11277-014-1669-3
-
(2014)
Wirel Person Commun
, vol.77
, Issue.4
, pp. 2817-2837
-
-
Li, C.1
Li, L.2
-
81
-
-
84860624319
-
The implementation of the travel cloud interpretation system
-
Harbin, China: IEEE Computer Society
-
Li R, Zhang Y, Wang Z, Sun X. The implementation of the travel cloud interpretation system. In: 2011 international conference on computer science and network technology. Harbin, China: IEEE Computer Society; 2011. p. 1449-51. http://dx.doi.org/10.1109/ICCSNT.2011.6182238.
-
(2011)
2011 International Conference on Computer Science and Network Technology
, pp. 1449-1451
-
-
Li, R.1
Zhang, Y.2
Wang, Z.3
Sun, X.4
-
82
-
-
84961396818
-
A service-oriented identity authentication privacy protection method in cloud computing
-
X. Li, J. He, and T. Zhang A service-oriented identity authentication privacy protection method in cloud computing Int J Grid Distrib Comput 6 1 2013 77 86
-
(2013)
Int J Grid Distrib Comput
, vol.6
, Issue.1
, pp. 77-86
-
-
Li, X.1
He, J.2
Zhang, T.3
-
83
-
-
84897715339
-
Addressing data and user mobility challenges in the cloud
-
Santa Clara, USA: IEEE
-
Lingfeng C, Hoang DB. Addressing data and user mobility challenges in the cloud. In: 2013 IEEE sixth international conference on cloud computing. Santa Clara, USA: IEEE; 2013. p. 549-56. http://dx.doi.org/10.1109/CLOUD.2013.26.
-
(2013)
2013 IEEE Sixth International Conference on Cloud Computing
, pp. 549-556
-
-
Lingfeng, C.1
Hoang, D.B.2
-
85
-
-
84918562009
-
Application partitioning algorithms in mobile cloud computing: Taxonomy, review and future directions
-
J. Liu, E. Ahmed, M. Shiraz, A. Gani, R. Buyya, and A. Qureshi Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions J Netw Comput Appl 48 February 2015 99 117 10.1016/j.jnca.2014.09.009
-
(2015)
J Netw Comput Appl
, vol.48
, Issue.February
, pp. 99-117
-
-
Liu, J.1
Ahmed, E.2
Shiraz, M.3
Gani, A.4
Buyya, R.5
Qureshi, A.6
-
86
-
-
8344266879
-
Authentication and authorization infrastructures (AAIs): A comparative survey
-
J. Lopez, R. Oppliger, and G. Pernul Authentication and authorization infrastructures (AAIs): a comparative survey Comput Secur 23 7 2004 578 590 10.1016/j.cose.2004.06.013
-
(2004)
Comput Secur
, vol.23
, Issue.7
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
87
-
-
84934913465
-
An analysis of security system for intrusion in smartphone environment
-
M. Louk, H. Lim, and H. Lee An analysis of security system for intrusion in smartphone environment Sci World J 2014 2014 1 12 10.1155/2014/983901
-
(2014)
Sci World J
, vol.2014
, pp. 1-12
-
-
Louk, M.1
Lim, H.2
Lee, H.3
-
90
-
-
84926277750
-
Cognitive radio ad-hoc network architectures: A survey
-
N. Mansoor, A.K.M. Muzahidul Islam, M. Zareei, S. Baharun, T. Wakabayashi, and S. Komaki Cognitive radio ad-hoc network architectures: a survey Wirel Person Commun 81 3 2015 1117 1142 10.1007/s11277-014-2175-3
-
(2015)
Wirel Person Commun
, vol.81
, Issue.3
, pp. 1117-1142
-
-
Mansoor, N.1
Muzahidul Islam, A.K.M.2
Zareei, M.3
Baharun, S.4
Wakabayashi, T.5
Komaki, S.6
-
92
-
-
84877896878
-
Data security in the cloud
-
B. Rajkumar, B. James, G. Andrzej, John Wiley & Sons, Inc.
-
S. Morrow Data security in the cloud B. Rajkumar, B. James, G. Andrzej, Cloud computing: principles and paradigms 2011 John Wiley & Sons, Inc. 573 592
-
(2011)
Cloud Computing: Principles and Paradigms
, pp. 573-592
-
-
Morrow, S.1
-
93
-
-
84855851281
-
Integration of wireless hand-held devices with the cloud architecture: Security and privacy issues
-
Barcelona, Spain: IEEE
-
Morshed MSJ, Islam MM, Huq MK, Hossain MS, Basher MA. Integration of wireless hand-held devices with the cloud architecture: security and privacy issues. In: 2011 international conference on P2P, parallel, grid, cloud and internet computing. Barcelona, Spain: IEEE; 2011. p. 83-8. http://dx.doi.org/10.1109/3PGCIC.2011.22.
-
(2011)
2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing
, pp. 83-88
-
-
Morshed, M.S.J.1
Islam, M.M.2
Huq, M.K.3
Hossain, M.S.4
Basher, M.A.5
-
94
-
-
84891843335
-
Delegate the smartphone user? Security awareness in smartphone platforms
-
A. Mylonas, A. Kastania, and D. Gritzalis Delegate the smartphone user? Security awareness in smartphone platforms Comput Secur 34 May 2013 47 66 10.1016/j.cose.2012.11.004
-
(2013)
Comput Secur
, vol.34
, Issue.May
, pp. 47-66
-
-
Mylonas, A.1
Kastania, A.2
Gritzalis, D.3
-
95
-
-
84945977000
-
Multi-dimensional and multi-level authentication techniques
-
T. Naik, and S. Koul Multi-dimensional and multi-level authentication techniques Int J Comput Appl 75 12 2013 17 22
-
(2013)
Int J Comput Appl
, vol.75
, Issue.12
, pp. 17-22
-
-
Naik, T.1
Koul, S.2
-
96
-
-
84881480645
-
An authentication model towards cloud federation in the enterprise
-
M. Noureddine, and R. Bashroush An authentication model towards cloud federation in the enterprise J Syst Softw 86 9 2013 2269 2275 10.1016/j.jss.2012.12.031
-
(2013)
J Syst Softw
, vol.86
, Issue.9
, pp. 2269-2275
-
-
Noureddine, M.1
Bashroush, R.2
-
97
-
-
79960141443
-
A study on authentication system using QR code for mobile cloud computing environment
-
Loutraki, Greece: Springer-Verlag
-
Oh D-S, Kim B-H, Lee J-K. A study on authentication system using QR code for mobile cloud computing environment. In: 6th international conference on future information technology. Loutraki, Greece: Springer-Verlag; 2011. p. 500-7. http://dx.doi.org/10.1007/978-3-642-22333-4-65.
-
(2011)
6th International Conference on Future Information Technology
, pp. 500-507
-
-
Oh, D.-S.1
Kim, B.-H.2
Lee, J.-K.3
-
98
-
-
84880460605
-
Cloud-ready biometric system for mobile security access
-
R. Benlamri, Springer Berlin, Heidelberg [Chapter 16]
-
F. Omri, R. Hamila, S. Foufou, and M. Jarraya Cloud-ready biometric system for mobile security access R. Benlamri, Networked digital technologies, communications in computer and information science vol. 294 2012 Springer Berlin, Heidelberg 192 200 10.1007/978-3-642-30567-2-16 [Chapter 16]
-
(2012)
Networked Digital Technologies, Communications in Computer and Information Science
, vol.294
, pp. 192-200
-
-
Omri, F.1
Hamila, R.2
Foufou, S.3
Jarraya, M.4
-
99
-
-
84860294696
-
ACCessory: Password inference using accelerometers on smartphones
-
New York, USA: ACM
-
Owusu E, Han J, Das S, Perrig A, Zhang J. ACCessory: password inference using accelerometers on smartphones. In: HotMobile '12, proceedings of the twelfth workshop on mobile computing systems and applications. New York, USA: ACM; 2012. p. 9:1-6. http://dx.doi.org/10.1145/2162081.2162095.
-
(2012)
HotMobile '12, Proceedings of the Twelfth Workshop on Mobile Computing Systems and Applications
, vol.9
, pp. 1-6
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
101
-
-
0346895307
-
Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
-
C.-S. Park Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems Comput Netw 44 2 2004 267 273 10.1016/j.comnet.2003.09.001
-
(2004)
Comput Netw
, vol.44
, Issue.2
, pp. 267-273
-
-
Park, C.-S.1
-
102
-
-
81255210704
-
SSP-MCloud: A study on security service protocol for smartphone centric mobile cloud computing
-
J.J. Park, H. Arabnia, H.-B. Chang, T. Shon, Springer Netherlands
-
J. Park, K. Yi, and J. Park SSP-MCloud: a study on security service protocol for smartphone centric mobile cloud computing J.J. Park, H. Arabnia, H.-B. Chang, T. Shon, IT convergence and services lecture notes in electrical engineering. Lecture notes in electrical Engineering vol. 107 2011 Springer Netherlands 165 172 10.1007/978-94-007-2598-0-18
-
(2011)
IT Convergence and Services Lecture Notes in Electrical Engineering. Lecture Notes in Electrical Engineering
, vol.107
, pp. 165-172
-
-
Park, J.1
Yi, K.2
Park, J.3
-
103
-
-
84901190797
-
Smartphone malware and its propagation modeling: A survey
-
S. Peng, S. Yu, and A. Yang Smartphone malware and its propagation modeling: a survey IEEE Commun Surv Tutor 16 2 2014 925 941 10.1109/SURV.2013.070813.00214
-
(2014)
IEEE Commun Surv Tutor
, vol.16
, Issue.2
, pp. 925-941
-
-
Peng, S.1
Yu, S.2
Yang, A.3
-
104
-
-
84878467162
-
A security framework for mobile cloud applications
-
Sinaia, Romania: IEEE
-
Popa D, Cremene M, Borda M, Boudaoud K. A security framework for mobile cloud applications. In: 11th IEEE conference on roedunet international conference. Sinaia, Romania: IEEE; 2013. p. 1-4. doi: http://dx.doi.org/10.1109/RoEduNet.2013.6511724.
-
(2013)
11th IEEE Conference on Roedunet International Conference
, pp. 1-4
-
-
Popa, D.1
Cremene, M.2
Borda, M.3
Boudaoud, K.4
-
105
-
-
80055106772
-
Mobile cloud computing as future for mobile applications - Implementation methods and challenging issues
-
Beijing, China: IEEE Computer Society
-
Qureshi SS, Ahmad T, Rafique K, Shuja Ul I. Mobile cloud computing as future for mobile applications - implementation methods and challenging issues. In: 2011 IEEE international conference on cloud computing and intelligence systems. Beijing, China: IEEE Computer Society; 2011. p. 467-71. http://dx.doi.org/10.1109/CCIS.2011.6045111.
-
(2011)
2011 IEEE International Conference on Cloud Computing and Intelligence Systems
, pp. 467-471
-
-
Qureshi, S.S.1
Ahmad, T.2
Rafique, K.3
Shuja Ul, I.4
-
106
-
-
79961048093
-
Odessa: Enabling interactive perception applications on mobile devices
-
New York, USA: IEEE Computer Society
-
Ra M-R, Sheth A, Mummert L, Pillai P, Wetherall D, Govindan R. Odessa: enabling interactive perception applications on mobile devices. In: Proceedings of the 9th international conference on mobile systems, applications, and services. New York, USA: IEEE Computer Society; 2011. p. 43-56.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
, pp. 43-56
-
-
Ra, M.-R.1
Sheth, A.2
Mummert, L.3
Pillai, P.4
Wetherall, D.5
Govindan, R.6
-
108
-
-
84899854200
-
Security and privacy issues in cloud computing
-
S. Rahul, and D.J.K. Sharda Security and privacy issues in cloud computing Int J Eng Res Technol 2 3 2013
-
(2013)
Int J Eng Res Technol
, vol.2
, Issue.3
-
-
Rahul, S.1
Sharda, D.J.K.2
-
109
-
-
80053551895
-
Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing
-
W. Ren, L. Yu, R. Gao, and F. Xiong Lightweight and compromise resilient storage outsourcing with distributed secure accessibility in mobile cloud computing Tsinghua Sci Technol 16 5 2011 520 528
-
(2011)
Tsinghua Sci Technol
, vol.16
, Issue.5
, pp. 520-528
-
-
Ren, W.1
Yu, L.2
Gao, R.3
Xiong, F.4
-
110
-
-
80053099984
-
A survey of authentication schemes for vehicular ad hoc networks
-
M. Riley, K. Akkaya, and K. Fong A survey of authentication schemes for vehicular ad hoc networks Secur Commun Netw 4 10 2011 1137 1152 10.1002/sec.239
-
(2011)
Secur Commun Netw
, vol.4
, Issue.10
, pp. 1137-1152
-
-
Riley, M.1
Akkaya, K.2
Fong, K.3
-
111
-
-
84863686587
-
Privacy preserving access control with authentication for securing data in clouds
-
Ottawa, Canada: IEEE
-
Ruj S, Stojmenovic M, Nayak A. Privacy preserving access control with authentication for securing data in clouds. In: 12th IEEE/ACM international symposium on cluster, cloud and grid computing. Ottawa, Canada: IEEE; 2012. p. 556-63.
-
(2012)
12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
, pp. 556-563
-
-
Ruj, S.1
Stojmenovic, M.2
Nayak, A.3
-
112
-
-
84869179184
-
SAMI: Service-based arbitrated multi-tier infrastructure model for mobile cloud computing
-
Beijing, China: IEEE
-
Sanaei Z, Abolfazli S, Shiraz M, Gani A. SAMI: service-based arbitrated multi-tier infrastructure model for mobile cloud computing. In: Proceedings of the IEEE MobiCC'12. Beijing, China: IEEE; 2012. p. 14-9.
-
(2012)
Proceedings of the IEEE MobiCC'12
, pp. 14-19
-
-
Sanaei, Z.1
Abolfazli, S.2
Shiraz, M.3
Gani, A.4
-
113
-
-
84894675432
-
Heterogeneity in mobile cloud computing: Taxonomy and open challenges
-
Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya Heterogeneity in mobile cloud computing: taxonomy and open challenges IEEE Commun Surv Tutor 16 1 2013 369 392 10.1109/SURV.2013.050113.00090
-
(2013)
IEEE Commun Surv Tutor
, vol.16
, Issue.1
, pp. 369-392
-
-
Sanaei, Z.1
Abolfazli, S.2
Gani, A.3
Buyya, R.4
-
114
-
-
84876140272
-
A lightweight multi-user authentication scheme based on cellular automata in cloud environment
-
Paris, France: IEEE
-
Sang-Ho S, Dong-Hyun K, Yoo K-Y. A lightweight multi-user authentication scheme based on cellular automata in cloud environment. In: 2012 IEEE 1st international conference on cloud networking. Paris, France: IEEE; 2012. p. 176-8. doi: http://dx.doi.org/10.1109/CloudNet.2012.6483680.
-
(2012)
2012 IEEE 1st International Conference on Cloud Networking
, pp. 176-178
-
-
Sang-Ho, S.1
Dong-Hyun, K.2
Yoo, K.-Y.3
-
115
-
-
70350136710
-
The case for VM-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies The case for VM-based cloudlets in mobile computing IEEE Pervas Comput 8 4 2009 14 23 10.1109/MPRV.2009.82
-
(2009)
IEEE Pervas Comput
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
117
-
-
84941111729
-
Security issues and challenges of mobile cloud computing
-
A. Shahzad, and M. Hussain Security issues and challenges of mobile cloud computing Int J Grid Distrib Comput 6 6 2013 37 50 10.14257/ijgdc.2013.6.6.04
-
(2013)
Int J Grid Distrib Comput
, vol.6
, Issue.6
, pp. 37-50
-
-
Shahzad, A.1
Hussain, M.2
-
118
-
-
77955209580
-
Mobility can help: Protect user identity with dynamic credential
-
Kansas City, USA: IEEE
-
Sheng X, Gong W. Mobility can help: protect user identity with dynamic credential. In: 2010 eleventh international conference on mobile data management. Kansas City, USA: IEEE; 2010. p. 378-80. http://dx.doi.org/10.1109/MDM.2010.73.
-
(2010)
2010 Eleventh International Conference on Mobile Data Management
, pp. 378-380
-
-
Sheng, X.1
Gong, W.2
-
119
-
-
85037074313
-
Implicit authentication through learning user behavior
-
M. Burmester, G. Tsudik, S. Magliveras, I. Ilić, Springer Berlin, Heidelberg
-
E. Shi, Y. Niu, M. Jakobsson, and R. Chow Implicit authentication through learning user behavior M. Burmester, G. Tsudik, S. Magliveras, I. Ilić, Information security. Lecture notes in computer science Vol. 6531 2011 Springer Berlin, Heidelberg 99 113 10.1007/978-3-642-18178-8-9
-
(2011)
Information Security. Lecture Notes in Computer Science
, vol.6531
, pp. 99-113
-
-
Shi, E.1
Niu, Y.2
Jakobsson, M.3
Chow, R.4
-
120
-
-
84904212775
-
Toward advanced mobile cloud computing for the internet of things: Current issues and future direction
-
T. Shon, J. Cho, K. Han, and H. Choi Toward advanced mobile cloud computing for the internet of things: current issues and future direction Mob Netw Appl 19 3 2014 404 413 10.1007/s11036-014-0509-8
-
(2014)
Mob Netw Appl
, vol.19
, Issue.3
, pp. 404-413
-
-
Shon, T.1
Cho, J.2
Han, K.3
Choi, H.4
-
121
-
-
84939120748
-
FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and genetic method
-
M. Shojafar, S. Javanmardi, S. Abolfazli, and N. Cordeschi FUGE: A joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and genetic method Cluster Compute 18 2 2015 829 844
-
(2015)
Cluster Compute
, vol.18
, Issue.2
, pp. 829-844
-
-
Shojafar, M.1
Javanmardi, S.2
Abolfazli, S.3
Cordeschi, N.4
-
122
-
-
84907343141
-
QoS-aware dynamic resource management in heterogeneous mobile cloud computing networks
-
P. Si, Q. Zhang, Y.F. Richard, and Y. Zhang QoS-aware dynamic resource management in heterogeneous mobile cloud computing networks China Commun 11 4 2014 144 159
-
(2014)
China Commun
, vol.11
, Issue.4
, pp. 144-159
-
-
Si, P.1
Zhang, Q.2
Richard, Y.F.3
Zhang, Y.4
-
123
-
-
0024015453
-
A survey of information authentication
-
G.J. Simmons A survey of information authentication Proc IEEE 76 5 1988 603 620 10.1109/5.4445
-
(1988)
Proc IEEE
, vol.76
, Issue.5
, pp. 603-620
-
-
Simmons, G.J.1
-
124
-
-
84938775953
-
Design and implementation of multi-tier authentication scheme in cloud
-
5-2
-
M. Singh, and S. Singh Design and implementation of multi-tier authentication scheme in cloud Int J Comput Sci Issues 9 5 5-2 2012 181 187
-
(2012)
Int J Comput Sci Issues
, vol.9
, Issue.5
, pp. 181-187
-
-
Singh, M.1
Singh, S.2
-
125
-
-
84863185930
-
TrustCube: An infrastructure that builds trust in client
-
D. Gawrock, H. Reimer, A.-R. Sadeghi, C. Vishik, Vieweg+Teubner
-
Z. Song, J. Molina, S. Lee, H. Lee, S. Kotani, and R. Masuoka TrustCube: an infrastructure that builds trust in client D. Gawrock, H. Reimer, A.-R. Sadeghi, C. Vishik, Future of trust in computing 2009 Vieweg+Teubner 68 79 10.1007/978-3-8348-9324-6-8
-
(2009)
Future of Trust in Computing
, pp. 68-79
-
-
Song, Z.1
Molina, J.2
Lee, S.3
Lee, H.4
Kotani, S.5
Masuoka, R.6
-
126
-
-
84874343540
-
Design and implementation of the web content adaptation for intelligent tourism cloud platform
-
Liaoning, China: IEEE
-
Song R, Li S, Yao Z, Li X. Design and implementation of the web content adaptation for intelligent tourism cloud platform. In: 2012 international conference on control engineering and communication technology. Liaoning, China: IEEE; 2012. p. 759-62. http://dx.doi.org/10.1109/ICCECT.2012.100.
-
(2012)
2012 International Conference on Control Engineering and Communication Technology
, pp. 759-762
-
-
Song, R.1
Li, S.2
Yao, Z.3
Li, X.4
-
127
-
-
84867509247
-
A combined approach to ensure data security in cloud computing
-
S.K. Sood A combined approach to ensure data security in cloud computing J Netw Comput Appl 35 6 2012 1831 1838 10.1016/j.jnca.2012.07.007
-
(2012)
J Netw Comput Appl
, vol.35
, Issue.6
, pp. 1831-1838
-
-
Sood, S.K.1
-
128
-
-
84901607854
-
A review on remote data auditing in single cloud server: Taxonomy and open issues
-
M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M.K. Khan A review on remote data auditing in single cloud server: taxonomy and open issues J Netw Comput Appl 43 August 2014 121 141 10.1016/j.jnca.2014.04.011
-
(2014)
J Netw Comput Appl
, vol.43
, Issue.August
, pp. 121-141
-
-
Sookhak, M.1
Talebian, H.2
Ahmed, E.3
Gani, A.4
Khan, M.K.5
-
131
-
-
33750084748
-
Quantifying interactive user experience on thin clients
-
N. Tolia, D.G. Andersen, and M. Satyanarayanan Quantifying interactive user experience on thin clients Computer 39 3 2006 46 52
-
(2006)
Computer
, vol.39
, Issue.3
, pp. 46-52
-
-
Tolia, N.1
Andersen, D.G.2
Satyanarayanan, M.3
-
132
-
-
84860738671
-
Robust mobile device integration of a fingerprint biometric remote authentication scheme
-
Fukuoka, Japan: Institute of Electrical and Electronics Engineers Inc.
-
Truong T-T, Tran M, Duong A-D. Robust mobile device integration of a fingerprint biometric remote authentication scheme. In: 26th IEEE international conference on advanced information networking and applications. Fukuoka, Japan: Institute of Electrical and Electronics Engineers Inc.; 2012. p. 678-5. http://dx.doi.org/10.1109/AINA.2012.47.
-
(2012)
26th IEEE International Conference on Advanced Information Networking and Applications
, pp. 678-685
-
-
Truong, T.-T.1
Tran, M.2
Duong, A.-D.3
-
133
-
-
84899099915
-
Adaptive deployment and configuration for mobile augmented reality in the cloudlet
-
T. Verbelen, P. Simoens, F. De Turck, and B. Dhoedt Adaptive deployment and configuration for mobile augmented reality in the cloudlet J Netw Comput Appl 41 May 2014 206 216 10.1016/j.jnca.2013.12.002
-
(2014)
J Netw Comput Appl
, vol.41
, Issue.May
, pp. 206-216
-
-
Verbelen, T.1
Simoens, P.2
De Turck, F.3
Dhoedt, B.4
-
134
-
-
84876464266
-
Data security and authentication in hybrid cloud computing model
-
Shenzhen, China: IEEE
-
Wang JK, Jia X. Data security and authentication in hybrid cloud computing model. In: 2012 IEEE global high tech congress on electronics. Shenzhen, China: IEEE; 2012. p. 117-20. doi: http://dx.doi.org/10.1109/GHTCE.2012.6490136.
-
(2012)
2012 IEEE Global High Tech Congress on Electronics
, pp. 117-120
-
-
Wang, J.K.1
Jia, X.2
-
135
-
-
84871750400
-
Smartphone security challenges
-
Y. Wang, K. Streff, and S. Raman Smartphone security challenges Computer 45 12 2012 52 58 10.1109/MC.2012.288
-
(2012)
Computer
, vol.45
, Issue.12
, pp. 52-58
-
-
Wang, Y.1
Streff, K.2
Raman, S.3
-
136
-
-
84873916904
-
Security of cloud computing lightweight authentication protocol
-
Kaohsiung, Taiwan: Trans Tech Publications
-
Wang S-C, Liao W-P, Yan K-Q, Wang S-S, Tsai S-H. Security of cloud computing lightweight authentication protocol. In: 2nd international conference on engineering and technology innovation 2012. Kaohsiung, Taiwan: Trans Tech Publications; 2013. p. 3502-6. doi: http://dx.doi.org/10.4028/www.scientific.net/AMM.284-287.3502.
-
(2013)
2nd International Conference on Engineering and Technology Innovation 2012
, pp. 3502-3506
-
-
Wang, S.-C.1
Liao, W.-P.2
Yan, K.-Q.3
Wang, S.-S.4
Tsai, S.-H.5
-
137
-
-
79960576001
-
SDSM: A secure data service mechanism in mobile cloud computing
-
Shanghai, China: IEEE
-
Weiwei J, Haojin Z, Zhenfu C, Lifei W, Xiaodong L. SDSM: a secure data service mechanism in mobile cloud computing. In: 2011 IEEE conference on computer communications workshops. Shanghai, China: IEEE; 2011. p. 1060-5. http://dx.doi.org/10.1109/INFCOMW.2011.5928784.
-
(2011)
2011 IEEE Conference on Computer Communications Workshops
, pp. 1060-1065
-
-
Weiwei, J.1
Haojin, Z.2
Zhenfu, C.3
Lifei, W.4
Xiaodong, L.5
-
138
-
-
84897998269
-
Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing
-
F. Xia, F. Ding, J. Li, X. Kong, L. Yang, and J. Ma Phone2Cloud: exploiting computation offloading for energy saving on smartphones in mobile cloud computing Inf Syst Front 16 1 2014 95 111 10.1007/s10796-013-9458-1
-
(2014)
Inf Syst Front
, vol.16
, Issue.1
, pp. 95-111
-
-
Xia, F.1
Ding, F.2
Li, J.3
Kong, X.4
Yang, L.5
Ma, J.6
-
139
-
-
84877272118
-
Security and privacy in cloud computing
-
Z. Xiao, and Y. Xiao Security and privacy in cloud computing IEEE Commun Surv Tutor 15 2 2013 843 859
-
(2013)
IEEE Commun Surv Tutor
, vol.15
, Issue.2
, pp. 843-859
-
-
Xiao, Z.1
Xiao, Y.2
-
141
-
-
84874268436
-
A cloud-based monitoring framework for smart home
-
Taipei, Taiwan: IEEE Computer Society
-
Xu L, Zheng X, Guo W, Chen G. A cloud-based monitoring framework for smart home. In: 4th IEEE international conference on cloud computing technology and science. Taipei, Taiwan: IEEE Computer Society; 2012. p. 805-10. http://dx.doi.org/10.1109/CloudCom.2012.6427534.
-
(2012)
4th IEEE International Conference on Cloud Computing Technology and Science
, pp. 805-810
-
-
Xu, L.1
Zheng, X.2
Guo, W.3
Chen, G.4
-
142
-
-
84888848223
-
Software service signature (S3) for authentication in cloud computing
-
L. Xu, X. Cao, Y. Zhang, and W. Wu Software service signature (S3) for authentication in cloud computing Clust Comput 16 4 2013 1 10 10.1007/s10586-013-0262-y
-
(2013)
Clust Comput
, vol.16
, Issue.4
, pp. 1-10
-
-
Xu, L.1
Cao, X.2
Zhang, Y.3
Wu, W.4
-
143
-
-
78149314657
-
An ontology-supported ubiquitous interface agent for cloud computing-example on Bluetooth wireless technique with java programming
-
Qingdao, China: IEEE
-
Yang SY, Hsu CL, Lee DL. An ontology-supported ubiquitous interface agent for cloud computing-example on Bluetooth wireless technique with java programming. In: Ninth international conference on machine learning and cybernetics. Qingdao, China: IEEE; 2010. p. 2971-8.
-
(2010)
Ninth International Conference on Machine Learning and Cybernetics
, pp. 2971-2978
-
-
Yang, S.Y.1
Hsu, C.L.2
Lee, D.L.3
-
144
-
-
84880084914
-
Fast dynamic execution offloading for efficient mobile cloud computing
-
San Diego, USA: IEEE
-
Yang S, Kwon Y, Cho Y, Yi H, Kwon D, Youn J, et al. Fast dynamic execution offloading for efficient mobile cloud computing. In: 2013 IEEE international conference on pervasive computing and communications (PerCom). San Diego, USA: IEEE; 2013. p. 20-8. http://dx.doi.org/10.1109/PerCom.2013.6526710.
-
(2013)
2013 IEEE International Conference on Pervasive Computing and Communications (PerCom)
, pp. 20-28
-
-
Yang, S.1
Kwon, Y.2
Cho, Y.3
Yi, H.4
Kwon, D.5
Youn, J.6
-
145
-
-
84907807860
-
Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing
-
S. Yang, D. Kwon, H. Yi, Y. Cho, Y. Kwon, and Y. Paek Techniques to minimize state transfer costs for dynamic execution offloading in mobile cloud computing IEEE Trans Mob Comput 13 11 2014 2648 2660 10.1109/TMC.2014.2307293
-
(2014)
IEEE Trans Mob Comput
, vol.13
, Issue.11
, pp. 2648-2660
-
-
Yang, S.1
Kwon, D.2
Yi, H.3
Cho, Y.4
Kwon, Y.5
Paek, Y.6
-
146
-
-
84893090541
-
Energy efficient task scheduling in mobile cloud computing
-
C.-H. Hsu, X. Li, X. Shi, R. Zheng, Springer Berlin, Heidelberg
-
D. Yao, C. Yu, H. Jin, and J. Zhou Energy efficient task scheduling in mobile cloud computing C.-H. Hsu, X. Li, X. Shi, R. Zheng, Network and parallel computing. Lecture notes in computer science vol. 8147 2013 Springer Berlin, Heidelberg 344 355 10.1007/978-3-642-40820-5-29
-
(2013)
Network and Parallel Computing. Lecture Notes in Computer Science
, vol.8147
, pp. 344-355
-
-
Yao, D.1
Yu, C.2
Jin, H.3
Zhou, J.4
-
147
-
-
84874587590
-
Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing
-
Xiangtan, China: IEEE
-
Yassin AA, Jin H, Ibrahim A, Zou D. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Second international conference on cloud and green computing. Xiangtan, China: IEEE; 2012. p. 282-9. doi: http://dx.doi.org/10.1109/CGC.2012.91.
-
(2012)
Second International Conference on Cloud and Green Computing
, pp. 282-289
-
-
Yassin, A.A.1
Jin, H.2
Ibrahim, A.3
Zou, D.4
-
148
-
-
84870660462
-
Desktop cloud-based research on unified authentication architecture
-
Xian, China: IEEE
-
Yongqing S, Xiang Z. Desktop cloud-based research on unified authentication architecture. In: 2012 spring congress on engineering and technology. Xian, China: IEEE; 2012. p. 1-4. doi: http://dx.doi.org/10.1109/SCET.2012.6342101.
-
(2012)
2012 Spring Congress on Engineering and Technology
, pp. 1-4
-
-
Yongqing, S.1
Xiang, Z.2
-
149
-
-
84859178298
-
A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices
-
E.-J. Yoon, S.-B. Choi, and K.-Y. Yoo A secure and efficiency ID-based authenticated key agreement scheme based on elliptic curve cryptosystem for mobile devices Comput Sci Eng 8 4 2012 2637 2653
-
(2012)
Comput Sci Eng
, vol.8
, Issue.4
, pp. 2637-2653
-
-
Yoon, E.-J.1
Choi, S.-B.2
Yoo, K.-Y.3
-
152
-
-
80155167231
-
A security framework of group location-based mobile applications in cloud computing
-
Taipei City: IEEE
-
Yu-Jia C, Li-Chun W. A security framework of group location-based mobile applications in cloud computing. In: 40th international conference on parallel processing workshops. Taipei City: IEEE; 2011. p. 184-90. http://dx.doi.org/10.1109/ICPPW.2011.6.
-
(2011)
40th International Conference on Parallel Processing Workshops
, pp. 184-190
-
-
Yu-Jia, C.1
Li-Chun, W.2
-
153
-
-
63649131787
-
On the anonymity of some authentication schemes for wireless communications
-
P. Zeng, Z. Cao, K.-k. Choo, and S. Wang On the anonymity of some authentication schemes for wireless communications IEEE Commun Lett 13 3 2009 170 171 10.1109/LCOMM.2009.081821
-
(2009)
IEEE Commun Lett
, vol.13
, Issue.3
, pp. 170-171
-
-
Zeng, P.1
Cao, Z.2
Choo, K.-K.3
Wang, S.4
-
154
-
-
84868110744
-
An new anonymous authentication scheme for cloud computing
-
Melbourne, Australia: IEEE
-
Zhang Z-h, Li J-j, Jiang W, Zhao Y, Gong B. An new anonymous authentication scheme for cloud computing. In: 7th international conference on computer science and education. Melbourne, Australia: IEEE; 2012. p. 896-8. doi: http://dx.doi.org/10.1109/ICCSE.2012.6295212.
-
(2012)
7th International Conference on Computer Science and Education
, pp. 896-898
-
-
Zhang, Z.-H.1
Li, J.-J.2
Jiang, W.3
Zhao, Y.4
Gong, B.5
-
155
-
-
84905915514
-
A remote monitoring system based on measuring instrument cloud
-
Switzerland, Nanjing, China: Trans Tech Publications
-
Zhang J, Liu YS, Xue L. A remote monitoring system based on measuring instrument cloud. In: 4th international conference on industry, information system and material engineering. Switzerland, Nanjing, China: Trans Tech Publications; 2014. p. 525-9. http://dx.doi.org/10.4028/www.scientific.net/AMR.1014.525.
-
(2014)
4th International Conference on Industry, Information System and Material Engineering
, pp. 525-529
-
-
Zhang, J.1
Liu, Y.S.2
Xue, L.3
-
156
-
-
84870010354
-
An identity-based authentication scheme in cloud computing
-
Xi'an, China: IEEE
-
Zhi-Hua Z, Jiang X-F, Jian-Jun L, Wei J. An identity-based authentication scheme in cloud computing. In: 2012 international conference on industrial control and electronics engineering. Xi'an, China: IEEE; 2012. p. 984-6. doi: http://dx.doi.org/10.1109/ICICEE.2012.261.
-
(2012)
2012 International Conference on Industrial Control and Electronics Engineering
, pp. 984-986
-
-
Zhi-Hua, Z.1
Jiang, X.-F.2
Jian-Jun, L.3
Wei, J.4
-
158
-
-
66449108023
-
PPAB: A privacy-preserving authentication and billing architecture for metropolitan area sharing networks
-
H. Zhu, X. Lin, M. Shi, P.-h. Ho, and X.S. Shen PPAB: a privacy-preserving authentication and billing architecture for metropolitan area sharing networks IEEE Trans Veh Technol 58 5 2009 2529 2543 10.1109/TVT.2008.2007983
-
(2009)
IEEE Trans Veh Technol
, vol.58
, Issue.5
, pp. 2529-2543
-
-
Zhu, H.1
Lin, X.2
Shi, M.3
Ho, P.-H.4
Shen, X.S.5
-
159
-
-
84918522665
-
Real-time tasks oriented energy-aware scheduling in virtualized clouds
-
X. Zhu, L.T. Yang, H. Chen, J. Wang, S. Yin, and X. Liu Real-time tasks oriented energy-aware scheduling in virtualized clouds IEEE Trans Cloud Comput 2 2 2014 168 180 10.1109/TCC.2014.2310452
-
(2014)
IEEE Trans Cloud Comput
, vol.2
, Issue.2
, pp. 168-180
-
-
Zhu, X.1
Yang, L.T.2
Chen, H.3
Wang, J.4
Yin, S.5
Liu, X.6
-
160
-
-
79959557055
-
Addressing cloud computing security issues
-
D. Zissis, and D. Lekkas Addressing cloud computing security issues Future Gener Comput Syst 28 3 2012 583 592 10.1016/j.future.2010.12.006
-
(2012)
Future Gener Comput Syst
, vol.28
, Issue.3
, pp. 583-592
-
-
Zissis, D.1
Lekkas, D.2
|