Funder
Deanship of Scientific Research, King Saud University
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference93 articles.
1. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges;Roman;Future Gener. Comput. Syst.,2018
2. Enforcing semantic integrity on untrusted clients in networked virtual environments;Jha;Secur. Privacy,2007
3. C. Castelluccia, et al., On the difficulty of software-based attestation of embedded devices, in: Proceedings of the 16th ACM Conference on Computer and Communications Security - CCS ’09, 2009, p. 400. Available at: http://portal.acm.org/citation.cfm?doid=1653662.1653711.
4. Y. Li, J. McCune, A. Perrig, SBAP: software-based attestation for peripherals. Trust and Trustworthy Computing, 2010. Available at: http://link.springer.com/chapter/10.1007/978-3-642-13869-0_2 [Accessed 02.02.14].
5. J. Howell, What You See is What they Get: Protecting users from unwanted use of microphones, camera, and other sensors, in: Proceedings of Web 2.0 Security and Privacy, 2010. Available at: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.7076 [Accessed 10.05.12].
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献