IEEE Access Special Section Editorial: Security and Reliability Aware System Design for Mobile Computing Devices (original) (raw)

Designing Security Protocols Adapted to the Constraints of Mobile Environments

Michel RIVEILL

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010

View PDFchevron_right

Case Studies in Security and Resource Management for Mobile Objects

G. Agha

Lecture Notes in Computer Science, 1998

View PDFchevron_right

Analytical study of hardware-rooted security standards and their implementation techniques in mobile

Ashraf Masood

Telecommunication Systems, 2020

View PDFchevron_right

Optimal resiliency against mobile faults

Juan A. Garay

Twenty-Fifth International Symposium on Fault-Tolerant Computing. Digest of Papers

View PDFchevron_right

Security engineering for embedded systems

Antonio Maña

Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems, 2010

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Security for Ubiquitous Computing: Problems and Proposed Solutionl

Hùng Lê

12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06), 2006

View PDFchevron_right

Improving the reliability of mobile software systems through continuous analysis and proactive reconfiguration

Ibrahim Elhag

2009 31st International Conference on Software Engineering - Companion Volume, 2009

View PDFchevron_right

Design and implementation of mobile trusted module for trusted mobile computing

youngsoo park

IEEE Transactions on Consumer Electronics, 2000

View PDFchevron_right

Security Issues in Mobile Code Paradigms

Rui Cardoso

Encyclopedia of Information Science and Technology, Second Edition, 2009

View PDFchevron_right

Secure architecture for embedded systems

Michael Geis

2015 IEEE High Performance Extreme Computing Conference (HPEC), 2015

View PDFchevron_right

Computer and Network Security [Working Title]

Jaydip Sen

2019

View PDFchevron_right

An investigation into security aspects addressed during the development of enterprise mobile applications

Kobus Kemp

2017

View PDFchevron_right

A Survey on Mobile Cloud Computing with Embedded Security Considerations

MUHAMMAD NASIR ABDULLAHI

International Journal of Cloud Computing and Services Science, 2014

View PDFchevron_right

Security Issues and Challenges of Mobile Cloud Computing

Abid shahzad

International Journal of Grid and Distributed Computing, 2013

View PDFchevron_right

Mobile and Wireless Network Security

Georg Carle

2003

View PDFchevron_right

Mobile devices and web services

Antonin Slaby

Proc. of the 7th Conference on 7th WSEAS …, 2007

View PDFchevron_right

Software Architecture for Limited Mobile Devices

Philippe Roose

View PDFchevron_right

Security of Information and Communication Technologies

Zoran Cekerevac

FBIM Transactions, 2019

View PDFchevron_right

Future research directions in design of reliable communication systems

Kishor S Trivedi

Telecommunication Systems, 2015

View PDFchevron_right

User authentication schemes for mobile and handheld devices

Naveen kumar

View PDFchevron_right

Behind the last line of defense: Surviving SoC faults and intrusions

Marcus Völp

Computers & Security

View PDFchevron_right

A security-and quality-aware system architecture for Internet of Things

Francesco De Pellegrini

Information Systems Frontiers, 2014

View PDFchevron_right

Advances in Security in Computing and Communications

MUFTAH FRAIFER

Advances in Security in Computing and Communications

View PDFchevron_right

Secure embedded system hardware design – A flexible security and trust enhanced approach

Apostolos Fournaris

Computers & Electrical Engineering, 2014

View PDFchevron_right

Usable Security: A Systematic Literature Review

Giorgia Tempestini

Information, 2023

View PDFchevron_right

Security Projects for Systems and Networking Professionals

Hamid Arabnia

Emerging Trends in ICT Security, 2014

View PDFchevron_right

The New Mobile Computing Landscape

San Murugesan

IT Professional, 2012

View PDFchevron_right

The Risks and Limitations of Security Mechanisms on Iot Environments

shilpa sarvaiya

2020

View PDFchevron_right

Evaluation of Authentication Algorithms for Small Devices

Georg Carle

2004

View PDFchevron_right

Antifragility: systems engineering at its best

Eric Verhulst

Journal of Reliable Intelligent Environments, 2015

View PDFchevron_right

Special : Applications and Service Platforms for the Mobile User

Apostolos Traganitis

2003

View PDFchevron_right

Towards Mobile Information Systems

Juhani Iivari

IFIP — The International Federation for Information Processing, 2005

View PDFchevron_right

Security middleware approaches and issues for ubiquitous applications

Fatmah Al Abdouli

Computers & Mathematics with Applications, 2010

View PDFchevron_right

Reliability study of an embedded operating system for industrial applications

José mqnuel González campelo

View PDFchevron_right