Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference45 articles.
1. Singh R, Singh P, Duhan M (2014) An effective implementation of security based algorithmic approach in mobile adhoc networks. Human-Centric Comput Inf Sci 4(7):1–4
2. Eslahi M, Naseri MV, Hashim H, Tahir NM, Saad EHM (2014) BYOD: current state and security challenges. In: IEEE Symposium on Computer Applications & Industrial Electronics, pp 189–192
3. Rhee K, Jeon W, Won D (2012) Security requirements of a mobile device management system. Int J Secur Appl 6(2):353–358
4. Oh D, Kim I, Kim K, Lee S-M, Ro WW (2015) Highly secure mobile devices assisted with trusted cloud computing environments. ETRI J 37(2):348–358
5. Ongtang M, McLaughlin S, Enck W, McDaniel P (2009) Semantically rich application-centric security in android. In: Proceedings of Annual Computer Security Applications Conference (ACSAC ’09), pp 73–82
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献