Design and implementation of secure file system in personal mobile computing

被引:0
|
作者
Chen, Hong
Liu, Yan
Yang, Yuhang
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:81 / 82
相关论文
共 50 条
  • [41] A Model for Secure Mobile Computing
    du Toit, Jaco
    Ellefsen, Ian
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1213 - 1221
  • [42] Secure File Sharing Scheme for Mobile Devices
    Huang, Kuo-Hsuan
    Chang, En-Chi
    Chang, Chen-Lin
    2013 FOURTH INTERNATIONAL CONFERENCE ON NETWORKING AND DISTRIBUTED COMPUTING (ICNDC), 2013, : 82 - 84
  • [43] Consolidated Identity Management System for secure mobile cloud computing
    Khalil, Issa
    Khreishah, Abdallah
    Azeem, Muhammad
    COMPUTER NETWORKS, 2014, 65 : 99 - 110
  • [44] LAVA: Secure delegation of mobile applets: Design, implementation and applications
    Hansoty, JN
    Vouk, M
    Wu, SF
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 242 - 247
  • [45] The design of secure mobile coupon mechanism with the implementation for NFC smartphones
    Chen, Yu-Yi
    Tsai, Meng-Lin
    Chang, Fong-Jia
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 204 - 217
  • [47] Design and Implementation of Secure Distributed Examination System
    Zhang, Yi
    Zhu, Weidong
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND MANAGEMENT INNOVATION (MSMI 2017), 2017, 31 : 302 - 306
  • [48] Design and Implementation of a Secure Online Lottery System
    Kuacharoen, Pramote
    ADVANCES IN INFORMATION TECHNOLOGY, 2012, 344 : 94 - 105
  • [50] Design and Implementation of a Secure Social Network System
    Layfield, Ryan
    Thuraisingham, Bhavani
    Khan, Latifur
    Kantarcioglu, Murat
    Rachapalli, Jyothsna
    ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 236 - 247