An efficient mobile location-based security service framework for resource-constrained devices

被引:0
|
作者
Zhang, Yinghui [1 ,2 ]
Ma, Xinwei [1 ]
Wu, Axin [3 ]
Ren, Fangyuan [1 ]
Zheng, Dong [1 ,2 ]
机构
[1] School of Cyberspace Security, Xi'an University of Posts and Telecommunications, Xi'an,710121, China
[2] Westone Cryptologic Research Center, Beijing,100070, China
[3] College of Cybersecurity, Jinan University, Guangzhou,510632, China
关键词
32;
D O I
10.6633/IJNS.202007_22(4).19
中图分类号
学科分类号
摘要
引用
收藏
页码:698 / 707
相关论文
共 50 条
  • [1] Jini lookup service for resource-constrained mobile devices
    Kim, CH
    Oh, M
    Choi, H
    [J]. PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 1575 - 1578
  • [2] Supporting Immersive Location-Based Games on Resource-Constrained Platforms
    Naliuka, Katsiaryna
    Carrigy, Tara
    Paterson, Natasa
    Cotton, Roisin
    Jensen, Soren K.
    Haahr, Mads
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER ENTERTAINMENT TECHNOLOGY (ACE 2010), 2010, : 102 - 103
  • [3] An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices
    Wu, Xin-Wen
    Farag, Waleed
    Ali, Sanwar
    Kulkarni, Siddhivinayak
    [J]. 2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 679 - 685
  • [4] An Efficient Security Algorithm in Mobile Computing for Resource Constrained Mobile Devices
    Light, Janet
    David, Deepika
    [J]. Q2SWINET'08: PROCEEDINGS OF THE FOURTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2008, : 113 - 114
  • [5] A JiniTM Lookup service for resource-constrained devices
    Smith, L
    Roe, C
    Knudsen, KS
    [J]. 2002 IEEE 4TH INTERNATIONAL WORKSHOP ON NETWORKED APPLIANCES, PROCEEDINGS, 2002, : 135 - 144
  • [6] A Distributed Security Mechanism for Resource-Constrained IoT Devices
    King, James
    Awad, Ali Ismail
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2016, 40 (01): : 133 - 143
  • [7] Attacks on Resource-Constrained IoT Devices and Security Solutions
    Sharma, Ravi
    Sharma, Nonita
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2022, 14 (01):
  • [8] A Novel Cloudlet-based Communication Framework for Resource-Constrained Devices
    ben Lazreg, Amel
    Ben Arbia, Dhafer
    Ben Arbia, Anis
    Youssef, Habib
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE, E-LEARNING AND INFORMATION SYSTEMS 2018 (DATA'18), 2018,
  • [9] Runtime Classification of Mobile Malware for Resource-Constrained Devices
    Milosevic, Jelena
    Malek, Miroslaw
    Ferrante, Alberto
    [J]. E-BUSINESS AND TELECOMMUNICATIONS (ICETE 2016), 2017, 764 : 195 - 215
  • [10] Distributed Execution for Resource-Constrained Mobile Consumer Devices
    Kim, Seonggun
    Rim, Heungsoon
    Han, Hwansoo
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2009, 55 (02) : 376 - 384