default search action
Pervasive and Mobile Computing, Volume 24
Volume 24, December 2015
- Marek R. Ogiela, Ilsun You, Fang-Yie Leu, Yu-Chee Tseng:
Secure ubiquitous computing. 1-3 - Fei Song, Rong Li, Huachun Zhou:
Feasibility and issues for establishing network-based carpooling scheme. 4-15 - Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Eleana Asimakopoulou, Federico Barrero, Nik Bessis:
The role of congestion in probabilistic broadcasting for ubiquitous wireless multi-hop networks through mediation analysis. 16-29 - Zhou Shao, David Taniar, Kiki Maulana Adhinugraha:
Range-kNN queries with privacy protection in a mobile environment. 30-49 - Ou Ruan, Neeraj Kumar, Debiao He, Jong-Hyouk Lee:
Efficient provably secure password-based explicit authenticated key agreement. 50-60 - Yan Sun, Tin-Yu Wu, Xiaoqiong Ma, Han-Chieh Chao:
Modeling and verifying EPC network intrusion system based on timed automata. 61-76 - Alessio Merlo, Mauro Migliardi, Luca Caviglione:
A survey on energy-aware security mechanisms. 77-90 - Young-Guk Ha, Bumsuk Jang:
Efficient TVA metadata encoding for mobile and ubiquitous content services. 91-100 - Baojiang Cui, Haifeng Jin, Giuliana Carullo, Zheli Liu:
Service-oriented mobile malware detection system based on mining strategies. 101-116 - Arcangelo Castiglione, Raffaele Pizzolante, Francesco Palmieri, Alfredo De Santis, Bruno Carpentieri, Aniello Castiglione:
Secure and reliable data communication in developing regions and rural areas. 117-128 - Meixia Miao, Jianfeng Wang, Hui Li, Xiaofeng Chen:
Secure multi-server-aided data deduplication in cloud computing. 129-137 - Junho Choi, Woon Sung, Chang Choi, Pankoo Kim:
Personal information leakage detection method using the inference-based access control model on the Android platform. 138-149 - Hae-Duck Joshua Jeong, Woojin Lee, Jiyoung Lim, WooSeok Hyun:
Utilizing a Bluetooth remote lock system for a smartphone. 150-165 - Mye M. Sohn, Sunghwan Jeong, Jongmo Kim, Hyun Jung Lee:
Augmented context-based recommendation service framework using knowledge over the Linked Open Data cloud. 166-178 - Yan Zhang, Jin Shi, Tian Zhang, Xiangwei Liu, Zhuzhong Qian:
Modeling and checking for Cyber-Physical System based on hybrid interface automata. 179-193 - Rasheed Hussain, Zeinab Rezaeifar, Yong-Hwan Lee, Heekuck Oh:
Secure and privacy-aware traffic information as a service in VANET-based clouds. 194-209 - Sheetal Kalra, Sandeep K. Sood:
Secure authentication scheme for IoT and cloud servers. 210-223 - Lin Ding, Chenhui Jin, Jie Guan:
Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting. 224-230 - Shih-Hao Hung, Shuen Wen Hsiao, Yu-Chi Teng, Roger Chien:
Real-time and intelligent private data protection for the Android platform. 231-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.