“Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial

被引:0
|
作者
Joanna Kołodziej
Martin Gilje Jaatun
Samee Ullah Khan
Mario Koeppen
机构
[1] Cracow University of Technology,Institute of Computer Science
[2] SINTEF ICT,Department of Software Engineering, Safety and Security
[3] North Dakota State University,Electrical & Computer Engineering Department
[4] Kyushu Institute of Technology,Network Design and Research Center
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:591 / 593
页数:2
相关论文
共 50 条
  • [21] Security and privacy solutions for low-cost RFID systems
    Ranasinghe, DC
    Engels, DW
    Cole, PH
    Proceedings of the 2004 Intelligent Sensors, Sensor Networks & Information Processing Conference, 2004, : 337 - 342
  • [22] Makespan and Security-Aware Workflow Scheduling for Cloud Service Cost Minimization
    Li, Liying
    Zhou, Chengliang
    Cong, Peijin
    Shen, Yufan
    Zhou, Junlong
    Wei, Tongquan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (02) : 609 - 624
  • [23] PhoneLens: A Low-Cost, Spatially Aware, Mobile-Interaction Device
    Roudaki, Amin
    Kong, Jun
    Walia, Gursimran S.
    Roudaki, Ali
    IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2014, 44 (03) : 301 - 314
  • [24] SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing
    Gai, Keke
    Qiu, Longfei
    Chen, Min
    Zhao, Hui
    Qiu, Meikang
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [25] Security-Aware Resource Allocation for Mobile Social Big Data: A Matching-Coalitional Game Solution
    Su, Zhou
    Xu, Qichao
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 632 - 642
  • [26] Lock and unlock: A data management algorithm for a security-aware cache
    Inoue, Koji
    2006 13TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2006, : 1093 - 1096
  • [27] An Automated Security-Aware Approach for Design of Embedded Systems on MPSoC
    Tan, Benjamin
    Biglari-Abhari, Morteza
    Salcic, Zoran
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16
  • [28] A security-aware metamodel for multi-agent systems (MAS)
    Beydoun, G.
    Low, G.
    Mouratidis, H.
    Henderson-Sellers, B.
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (05) : 832 - 845
  • [29] Security-Aware Functional Modeling of Cyber-Physical Systems
    Wan, Jiang
    Canedo, Arquimedes
    Al Faruque, Mohammad Abdullah
    PROCEEDINGS OF 2015 IEEE 20TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2015,
  • [30] A low-cost checkpointing scheme for mobile computing systems
    Li, GH
    Wang, HY
    Chen, JX
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT: PROCEEDINGS, 2004, 3129 : 97 - 106