A trusted mobile interaction in ubiquitous networks

被引:0
|
作者
Qianmu, Li [1 ]
Guosheng, Zhan [1 ]
Jun, Hou [1 ]
Hong, Zhang [2 ]
Yong, Qi [3 ]
机构
[1] School of Computer Science, Nanjing University of Science and Technology, Nanjing, China
[2] Wuxi Institute, Nanjing University of Science and Technology, Wuxi, China
[3] Changshu/Lianyungang Institute, Nanjing University of Science and Technology, Changshu, China
关键词
Ubiquitous computing;
D O I
10.4156/ijact.vol4.issue15.40
中图分类号
学科分类号
摘要
引用
收藏
页码:346 / 353
相关论文
共 50 条
  • [21] Design and Implementation of Mobile Trusted Module for Trusted Mobile Computing
    Kim, Mooseop
    Kim, Youngsae
    Ju, Hongil
    Park, Youngsoo
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [22] Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module
    McGill, Kathleen N.
    JOHNS HOPKINS APL TECHNICAL DIGEST, 2013, 32 (02): : 544 - 554
  • [23] Landscaping Future Interaction: Special issue on Mobile and Ubiquitous Multimedia
    Wiberg, Mikael
    Zaslavsky, Arkady
    IEEE MULTIMEDIA, 2010, 17 (02) : 12 - 14
  • [24] Ubiquitous and context-aware services in future mobile networks
    Murase, A
    JOURNAL OF THE COMMUNICATIONS NETWORK, 2003, 2 : 179 - 182
  • [25] Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks
    Tirthankar Ghosh
    Niki Pissinou
    Kami Sam Makki
    Mobile Networks and Applications, 2005, 10 : 985 - 995
  • [26] Digital forensics in mobile computing system and ubiquitous wireless networks
    Deng, Der-Jiunn
    Shu, Lei
    Kato, Nei
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2492 - 2494
  • [27] Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
    Li, Zhenjiang
    Li, Mo
    Wang, Jiliang
    Cao, Zhichao
    2011 PROCEEDINGS IEEE INFOCOM, 2011, : 2246 - 2254
  • [28] Trusted information exchange in peer-to-peer mobile social networks
    Qureshi, Basit
    Min, Geyong
    Kouvatsos, Demetres
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 2055 - 2068
  • [29] Towards designing a trusted routing solution in mobile ad hoc networks
    Ghosh, T
    Pissinou, N
    Makki, K
    MOBILE NETWORKS & APPLICATIONS, 2005, 10 (06): : 985 - 995
  • [30] Trusted Spanning Trees for Delay Tolerant Mobile Ad Hoc Networks
    Piyatumrong, Apivadee
    Bouvry, Pascal
    Guinand, Frederic
    Lavangnananda, Kittichai
    2008 IEEE CONFERENCE ON SOFT COMPUTING IN INDUSTRIAL APPLICATIONS SMCIA/08, 2009, : 131 - +