• No results found

[PDF] Top 20 Art Survey of Secure Mobile Computing

Has 10000 "Art Survey of Secure Mobile Computing" found on our website. Below are the top 20 most common "Art Survey of Secure Mobile Computing".

Art Survey of Secure Mobile Computing

Art Survey of Secure Mobile Computing

... Service Availability Protection To protect the network from the problem of service unavailability due to the existence of selfish nodes, Buttyan and Hubaux proposed so-called Nuglets [17] that serve as a per-hop payment ... See full document

7

A Survey on Cloud Computing and Mobile Cloud Computing

A Survey on Cloud Computing and Mobile Cloud Computing

... Cloud computing is verity cheap way for users to access different resources and applications at same ...Cloud computing is safe to secure all resources and data of a ...Cloud computing ... See full document

5

Survey On Hyperelliptic Curve Cryptography To Secure Cloud Computing

Survey On Hyperelliptic Curve Cryptography To Secure Cloud Computing

... for secure data transmission from one cloud to another or alternative clouds with ...to secure the transfer of data between two public clouds victimization ... See full document

6

Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge Computing

Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge Computing

... Major computing power of devices used for FMEC is also ...FMEC computing device where sensor security is verified and an rJSON is requested if any sensor device trustworthiness is ...of computing ... See full document

15

Secure & Efficient Cloud Storage Middleware for Mobile Cloud Computing

Secure & Efficient Cloud Storage Middleware for Mobile Cloud Computing

... as mobile cloud computing is a new model [4], it still has an opportunity for future research expansion in the three areas: First, Security issues are still frightening and there should be an appropriate ... See full document

8

A Survey of Mobile Computing:  Limitations and Challenges

A Survey of Mobile Computing: Limitations and Challenges

... on mobile computing software architects to incorporate security ...with mobile PCs to utilize close-by printers yet disallow access to inaccessible printers and assets assigned for doctor's facility ... See full document

6

A Framework For Secure Mobile Cloud Computing In Effective Electronic Learning

A Framework For Secure Mobile Cloud Computing In Effective Electronic Learning

... cloud computing technology is growing rapidly among the users and at the same time it introduces the new security ...targeting mobile devices and are found abundantly with applications downloaded in various ... See full document

11

Security Challenges in Mobile Computing – A State of Art Survey

Security Challenges in Mobile Computing – A State of Art Survey

... off. Mobile Cloud Computing at its simplest refers to an infrastructure where both the data storage and the data processing happen outside of the mobile ...device. Mobile cloud applications ... See full document

7

Secure Data Platform for Mobile Computing

Secure Data Platform for Mobile Computing

... the mobile users called mobicloud to performs computationally intensive operation such as searching, data mining, and multimedia ...management, secure routing, and risk management issues in this framework ... See full document

7

Security, Privacy and Challenges in Mobile Cloud Computing (MCC):- A Critical Study and Comparison

Security, Privacy and Challenges in Mobile Cloud Computing (MCC):- A Critical Study and Comparison

... ABSTRACT: Mobile Cloud Computing (MCC) is a combination of three main parts; they are mobile device, cloud computing and mobile ...a mobile user gets a rich application delivered ... See full document

8

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing

... 5 | P a g e action should result in excessive renouncement value. This isn't appropriate for mobile phones furthermore. Indisputably, there may be no right direction of action that may correctly take care of the ... See full document

9

Consolidated Identity Management System for Secure Mobile Cloud Computing

Consolidated Identity Management System for Secure Mobile Cloud Computing

... Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like the electricity ...cloud computing is a ... See full document

6

Secure Cloud Computing with Third Party Auditing: A Survey

Secure Cloud Computing with Third Party Auditing: A Survey

... Cloud computing based technology and their impact is growing now a ...Cloud computing is used in all the area of Business, Education, Social Impact and data ...cloud computing environment are a major ... See full document

6

Secure Live VM Migration in Cloud Computing: A Survey

Secure Live VM Migration in Cloud Computing: A Survey

... SECURE VM MIGRATION Security is one of major issue in cloud computing.CC provides service over internet; it might be possible that on using a type of CC user can lose its sensitive data [r] ... See full document

5

A Survey On Information Flow Control for Secure Cloud Computing

A Survey On Information Flow Control for Secure Cloud Computing

... To secure data flows within virtual machine author proposed kernel level protection by applying IFC enabled middleware. Paper describes IFC enables messaging middleware. This approach decides IFC constraints on ... See full document

7

A Survey of Secure Routing in Mobile Ad-hoc Network
                 

A Survey of Secure Routing in Mobile Ad-hoc Network  

... Here we study the intrusion detection problem by characterizing intrusion detection probability with respect to the intrusion distance and the network parameters (i.e., node density, sensing range, and transmission ... See full document

7

Secure Architecture for Mobile Cloud based Learning

Secure Architecture for Mobile Cloud based Learning

... Authorization: Authorization is the process in which the system makes sure that the user has proper right to certain resources. Generally each valid user will be given certain access rights to certain resources. For ... See full document

5

A Survey on Mobile Phone Voting System with High Secure

A Survey on Mobile Phone Voting System with High Secure

... most mobile phone devices as it is very simple and with as limited pictures or graphics as ...inexpensive mobile devices; these devices are used by people in mostly rural and also in urban parts of the ... See full document

8

ISSN: 2321-8363 Impact Factor: 5.515

ISSN: 2321-8363 Impact Factor: 5.515

... to survey recent research related to clouds security ...cloud computing plays a major role in the cloud computing, as customers often store important information with cloud storage providers but ... See full document

6

SURVEY ON LOAD BALANCING IN MOBILE CLOUD COMPUTING

SURVEY ON LOAD BALANCING IN MOBILE CLOUD COMPUTING

... N.Kapoor et. al., [15] proposed a model for job-oriented resource scheduling in a mobile cloud computing environment. The workflow was allocated or scheduled to the process which gives the available ... See full document

6

Show all 10000 documents...