


default search action
Pervasive and Mobile Computing, Volume 24
Volume 24, December 2015
- Marek R. Ogiela, Ilsun You, Fang-Yie Leu, Yu-Chee Tseng:

Secure ubiquitous computing. 1-3 - Fei Song, Rong Li, Huachun Zhou:

Feasibility and issues for establishing network-based carpooling scheme. 4-15 - Daniel Gutiérrez-Reina, Sergio L. Toral Marín, Eleana Asimakopoulou, Federico Barrero

, Nik Bessis
:
The role of congestion in probabilistic broadcasting for ubiquitous wireless multi-hop networks through mediation analysis. 16-29 - Zhou Shao, David Taniar

, Kiki Maulana Adhinugraha
:
Range-kNN queries with privacy protection in a mobile environment. 30-49 - Ou Ruan, Neeraj Kumar

, Debiao He
, Jong-Hyouk Lee:
Efficient provably secure password-based explicit authenticated key agreement. 50-60 - Yan Sun, Tin-Yu Wu, Xiaoqiong Ma, Han-Chieh Chao

:
Modeling and verifying EPC network intrusion system based on timed automata. 61-76 - Alessio Merlo

, Mauro Migliardi
, Luca Caviglione
:
A survey on energy-aware security mechanisms. 77-90 - Young-Guk Ha

, Bumsuk Jang:
Efficient TVA metadata encoding for mobile and ubiquitous content services. 91-100 - Baojiang Cui, Haifeng Jin, Giuliana Carullo, Zheli Liu:

Service-oriented mobile malware detection system based on mining strategies. 101-116 - Arcangelo Castiglione

, Raffaele Pizzolante, Francesco Palmieri
, Alfredo De Santis
, Bruno Carpentieri
, Aniello Castiglione
:
Secure and reliable data communication in developing regions and rural areas. 117-128 - Meixia Miao, Jianfeng Wang

, Hui Li, Xiaofeng Chen:
Secure multi-server-aided data deduplication in cloud computing. 129-137 - Junho Choi, Woon Sung, Chang Choi

, Pankoo Kim:
Personal information leakage detection method using the inference-based access control model on the Android platform. 138-149 - Hae-Duck Joshua Jeong

, Woojin Lee
, Jiyoung Lim, WooSeok Hyun:
Utilizing a Bluetooth remote lock system for a smartphone. 150-165 - Mye M. Sohn

, Sunghwan Jeong, Jongmo Kim, Hyun Jung Lee:
Augmented context-based recommendation service framework using knowledge over the Linked Open Data cloud. 166-178 - Yan Zhang, Jin Shi, Tian Zhang, Xiangwei Liu, Zhuzhong Qian:

Modeling and checking for Cyber-Physical System based on hybrid interface automata. 179-193 - Rasheed Hussain

, Zeinab Rezaeifar, Yong-Hwan Lee
, Heekuck Oh:
Secure and privacy-aware traffic information as a service in VANET-based clouds. 194-209 - Sheetal Kalra

, Sandeep K. Sood
:
Secure authentication scheme for IoT and cloud servers. 210-223 - Lin Ding

, Chenhui Jin, Jie Guan:
Slide attack on standard stream cipher Enocoro-80 in the related-key chosen IV setting. 224-230 - Shih-Hao Hung, Shuen Wen Hsiao, Yu-Chi Teng, Roger Chien:

Real-time and intelligent private data protection for the Android platform. 231-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














