A trusted mobile interaction in ubiquitous networks

被引:0
|
作者
Qianmu, Li [1 ]
Guosheng, Zhan [1 ]
Jun, Hou [1 ]
Hong, Zhang [2 ]
Yong, Qi [3 ]
机构
[1] School of Computer Science, Nanjing University of Science and Technology, Nanjing, China
[2] Wuxi Institute, Nanjing University of Science and Technology, Wuxi, China
[3] Changshu/Lianyungang Institute, Nanjing University of Science and Technology, Changshu, China
关键词
Ubiquitous computing;
D O I
10.4156/ijact.vol4.issue15.40
中图分类号
学科分类号
摘要
引用
收藏
页码:346 / 353
相关论文
共 50 条
  • [41] Exploiting Ubiquitous Data Collection for Mobile Users in Wireless Sensor Networks
    Li, Zhenjiang
    Liu, Yunhao
    Li, Mo
    Wang, Jiliang
    Cao, Zhichao
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (02) : 312 - 326
  • [42] CountTorrent: Ubiquitous Access to Query Aggregates in Dynamic and Mobile Sensor Networks
    Kamra, Abhinav
    Misra, Vishal
    Rubenstein, Dan
    SENSYS'07: PROCEEDINGS OF THE 5TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, 2007, : 43 - 57
  • [43] Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks
    Cagalaban, Giovanni
    Kim, Seoksoo
    SIGNAL PROCESSING AND MULTIMEDIA, 2010, 123 : 196 - 203
  • [44] A Mobile and Wireless Healthcare System based on Agent Platform for Ubiquitous Networks
    Kim, Dong-Uk
    Lee, Kyu Min
    Choi, Kee-Hyun
    Shin, Dong-Ryeol
    2006 THE JOINT INTERNATIONAL CONFERENCE ON OPTICAL INTERNET (COIN) AND NEXT GENERATION NETWORK (NGNCON), 2006, : 138 - 140
  • [45] A Property-Based Mobile Platform Trusted Authentication Scheme for Wireless Networks
    Sun, Lina
    Chang, Guiran
    Wang, Xingwei
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 1157 - 1161
  • [46] Building a trusted community for mobile ad hoc networks using friend recommendation
    Razak, Shukor Abd
    Furnell, Steven
    Clarke, Nathan
    Brooke, Phillip
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2007, 4686 : 129 - +
  • [47] An Adaptive Trusted Request and Authorization Model for Mobile Peer-to-Peer Networks
    Li, Zhiyuan
    Bi, Junlei
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1274 - 1280
  • [48] Leveraging Trusted Network Connect for Secure Connection of Mobile Devices to Corporate Networks
    Detken, Kai-Oliver
    Fhom, Hervais Simo
    Sethmann, Richard
    Diederich, Guenther
    COMMUNICATIONS: WIRELESS IN DEVELOPING COUNTRIES AND NETWORKS OF THE FUTURE, 2010, 327 : 158 - +
  • [49] Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    Sauveron, Damien
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 448 - 456
  • [50] Mobile Security and Trusted Computing
    Mitchell, Chris
    IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 321 - 326