Fellah et al., 2020 - Google Patents
Mobile cloud computing: architecture, advantages and security issuesFellah et al., 2020
- Document ID
- 15246696297524042092
- Author
- Fellah H
- Mezioud C
- Batouche M
- Publication year
- Publication venue
- Proceedings of the 3rd International Conference on Networking, Information Systems & Security
External Links
Snippet
In the last few years, Mobile Cloud Computing has become an emerging area of research due to the important developments in mobile networks and Cloud Computing. Computing power and data storage are being moved away from mobile devices to be performed on …
- 238000005265 energy consumption 0 abstract description 7
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11838306B2 (en) | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking | |
Mollah et al. | Security and privacy challenges in mobile cloud computing: Survey and way ahead | |
Al-Janabi et al. | Mobile cloud computing: challenges and future research directions | |
Ahmed et al. | A review of challenges and security risks of cloud computing | |
Sahu et al. | Cloud computing in mobile applications | |
Man et al. | A collaborative intrusion detection system framework for cloud computing | |
US9021578B1 (en) | Systems and methods for securing internet access on restricted mobile platforms | |
Fellah et al. | Mobile cloud computing: architecture, advantages and security issues | |
Rani et al. | Cloud Computing An Empowering Technology: Architecture, Applications and Challenges | |
Neware et al. | Survey on Security Issues in Mobile Cloud Computing and Preventive Measures | |
Moon et al. | Intelligent security model of smart phone based on human behavior in mobile cloud computing | |
Perez et al. | A quick survey on cloud computing and associated security, mobility and IoT issues | |
Singhal | Survey on security issues in mobile cloud computing and preventive measures | |
US11924241B1 (en) | Real-time mitigative security architecture | |
Rayapuri | A Survey of Security and Privacy in Mobile Cloud Computing | |
Katal | Security and Privacy in Mobile Cloud Computing | |
Pal et al. | A Comparative Study of Significance of Mobile Cloud Computing in the Modern World | |
Patil et al. | Study of an effective way of detecting unexpected permission authorization to mobile apps | |
Miyamoto et al. | Offloading smartphone firewalling using OpenFlow-capable wireless access points | |
Das et al. | Smartphone Security by Cloud Computing | |
Popa et al. | Overview on Mobile Cloud Computing security issues [articol] | |
Hnini et al. | Security in cloud-based IoT: A survey |