共 50 条
- [1] Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2018, 8
- [4] An efficient and secure data sharing scheme for mobile devices in cloud computing [J]. Journal of Cloud Computing, 9
- [5] An efficient and secure data sharing scheme for mobile devices in cloud computing [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
- [6] Overview of Human-Centric Computing [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2012, 48 (02): : 124 - 128
- [7] Host-based intrusion detection system for secure human-centric computing [J]. The Journal of Supercomputing, 2016, 72 : 2520 - 2536
- [8] Host-based intrusion detection system for secure human-centric computing [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (07): : 2520 - 2536
- [9] A Framework for Human-centric Personalization of Context Recognition Models on Mobile Devices [J]. IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 885 - 888
- [10] Virtual workshops for human-centric computing [J]. 2004 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN CENTRIC COMPUTING: PROCEEDINGS, 2004, : 65 - 68