


default search action
Pervasive and Mobile Computing, Volume 24
Volume 24, December 2015
- Marek R. Ogiela, Ilsun You, Fang-Yie Leu, Yu-Chee Tseng:
Secure ubiquitous computing. 1-3 - Fei Song, Rong Li, Huachun Zhou:
Feasibility and issues for establishing network-based carpooling scheme. 4-15 - Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Eleana Asimakopoulou, Federico Barrero
, Nik Bessis
:
The role of congestion in probabilistic broadcasting for ubiquitous wireless multi-hop networks through mediation analysis. 16-29 - Zhou Shao, David Taniar
, Kiki Maulana Adhinugraha
:
Range-kNN queries with privacy protection in a mobile environment. 30-49 - Ou Ruan, Neeraj Kumar
, Debiao He
, Jong-Hyouk Lee:
Efficient provably secure password-based explicit authenticated key agreement. 50-60 - Yan Sun, Tin-Yu Wu, Xiaoqiong Ma, Han-Chieh Chao
:
Modeling and verifying EPC network intrusion system based on timed automata. 61-76 - Alessio Merlo
, Mauro Migliardi
, Luca Caviglione
:
A survey on energy-aware security mechanisms. 77-90 - Young-Guk Ha
, Bumsuk Jang:
Efficient TVA metadata encoding for mobile and ubiquitous content services. 91-100 - Baojiang Cui, Haifeng Jin, Giuliana Carullo, Zheli Liu:
Service-oriented mobile malware detection system based on mining strategies. 101-116 - Arcangelo Castiglione
, Raffaele Pizzolante, Francesco Palmieri
, Alfredo De Santis
, Bruno Carpentieri
, Aniello Castiglione
:
Secure and reliable data communication in developing regions and rural areas. 117-128 - Meixia Miao, Jianfeng Wang, Hui Li, Xiaofeng Chen:
Secure multi-server-aided data deduplication in cloud computing. 129-137 - Junho Choi, Woon Sung, Chang Choi
, Pankoo Kim:
Personal information leakage detection method using the inference-based access control model on the Android platform. 138-149 - Hae-Duck Joshua Jeong
, Woojin Lee
, Jiyoung Lim, WooSeok Hyun:
Utilizing a Bluetooth remote lock system for a smartphone. 150-165 - Mye M. Sohn
, Sunghwan Jeong, Jongmo Kim, Hyun Jung Lee:
Augmented context-based recommendation service framework using knowledge over the Linked Open Data cloud. 166-178 - Yan Zhang, Jin Shi, Tian Zhang, Xiangwei Liu, Zhuzhong Qian:
Modeling and checking for Cyber-Physical System based on hybrid interface automata. 179-193 - Rasheed Hussain
, Zeinab Rezaeifar, Yong-Hwan Lee
, Heekuck Oh:
Secure and privacy-aware traffic information as a service in VANET-based clouds. 194-209 - Sheetal Kalra
, Sandeep K. Sood
:
Secure authentication scheme for IoT and cloud servers. 210-223 - Lin Ding
, Chenhui Jin, Jie Guan:
Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting. 224-230 - Shih-Hao Hung, Shuen Wen Hsiao, Yu-Chi Teng, Roger Chien:
Real-time and intelligent private data protection for the Android platform. 231-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.