Academic literature on the topic 'Secure computing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure computing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure computing"
Ogiela, Marek R., Ilsun You, Fang-Yie Leu, and Yu-Chee Tseng. "Secure ubiquitous computing." Pervasive and Mobile Computing 24 (December 2015): 1–3. http://dx.doi.org/10.1016/j.pmcj.2015.09.005.
Full textSchiller, Jeffrey I. "Secure Distributed Computing." Scientific American 271, no. 5 (1994): 72–76. http://dx.doi.org/10.1038/scientificamerican1194-72.
Full textHAMLEN, KEVIN W., and BHAVANI THURAISINGHAM. "SECURE SEMANTIC COMPUTING." International Journal of Semantic Computing 05, no. 02 (2011): 121–31. http://dx.doi.org/10.1142/s1793351x11001201.
Full textMiguel, Rodel Felipe, Sivaraman Sundaram, and K. M. M. Aung. "Secure Object Stores (SOS): Non-Volatile Memory Architecture for Secure Computing." Journal of Computers 11, no. 3 (2016): 189–94. http://dx.doi.org/10.17706/jcp.11.3.189-194.
Full textKaur, Simranjeet. "Enhancing the Techniques to Secure Grid Computing." International Journal of Trend in Scientific Research and Development Volume-1, Issue-6 (2017): 460–63. http://dx.doi.org/10.31142/ijtsrd2531.
Full textR, Yogesh Rajkumar, and Kaliyamurthie K.P. "Secure Cloud Data Computing Using Different Algorithms." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (2019): 111–16. http://dx.doi.org/10.5373/jardcs/v11i12/20193219.
Full textMunir, Kashif, and Sellapan Palaniappan. "Framework for Secure Cloud Computing." International Journal on Cloud Computing: Services and Architecture 3, no. 2 (2013): 21–35. http://dx.doi.org/10.5121/ijccsa.2013.3202.
Full textSzweda, Roy. "Secure Computing unveils NT firewall." Network Security 1997, no. 8 (1997): 7. http://dx.doi.org/10.1016/s1353-4858(97)83237-0.
Full textLombardi, Flavio, and Roberto Di Pietro. "Secure virtualization for cloud computing." Journal of Network and Computer Applications 34, no. 4 (2011): 1113–22. http://dx.doi.org/10.1016/j.jnca.2010.06.008.
Full textHu, Ping, and Bruce Christianson. "Is your computing environment secure?" ACM SIGOPS Operating Systems Review 29, no. 4 (1995): 87–96. http://dx.doi.org/10.1145/219282.219300.
Full textDissertations / Theses on the topic "Secure computing"
Wouters, Erik Henricus. "Secure Intermittent Computing." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254588.
Full textPaladi, Nicolae. "Trusted Computing and Secure Virtualization in Cloud Computing." Thesis, Security Lab, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24035.
Full textLuo, Changqing. "Towards Secure Big Data Computing." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case1529929603348119.
Full textSzefer, Jakub M. "Architectures for secure cloud computing servers." Thesis, Princeton University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3597568.
Full textNATH, PANDEY ARUNENDRA. "Secure IDMS for Cloud Computing Environment." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121175.
Full textSuslowicz, Charles Eugene. "Secure Intermittent Computing: Precomputation and Implementation." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83376.
Full textWang, Bing. "Search over Encrypted Data in Cloud Computing." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71466.
Full textKopal, Nils [Verfasser]. "Secure Volunteer Computing for Distributed Cryptanalysis / Nils Kopal." Kassel : Kassel University Press, 2018. http://d-nb.info/1150305061/34.
Full textCao, Ning. "Secure and Reliable Data Outsourcing in Cloud Computing." Digital WPI, 2012. https://digitalcommons.wpi.edu/etd-dissertations/333.
Full textThomas, Godwin Dogara Ayenajeh. "A framework for secure mobile computing in healthcare." Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/618.
Full textBooks on the topic "Secure computing"
Jajodia, Sushil, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, and Cliff Wang, eds. Secure Cloud Computing. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9278-8.
Full textAhmed, Mohiuddin, and Paul Haskell-Dowland. Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635.
Full textKizza, Joseph Migga. Ethical and Secure Computing. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03937-0.
Full textChang, Chip-Hong, and Miodrag Potkonjak, eds. Secure System Design and Trustable Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-14971-4.
Full textCase studies in secure computing: Achievements and trends. CRC Press/Taylor & Francis Group, 2015.
Find full textAcharjya, D. P., and B. K. Tripathy. Advances in secure computing, internet services, and applications. Information Science Reference, an imprint of IGI Global, 2014.
Find full textPark, James J., Javier Lopez, Sang-Soo Yeo, Taeshik Shon, and David Taniar, eds. Secure and Trust Computing, Data Management and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22339-6.
Full textLee, Changhoon, Jean-Marc Seigneur, James J. Park, and Roland R. Wagner, eds. Secure and Trust Computing, Data Management, and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22365-5.
Full textWeber, Stefan G. Multilaterally secure pervasive cooperation: Privacy protection, accountability and secure communication for the age of pervasive computing. IOS Press, 2012.
Find full textBook chapters on the topic "Secure computing"
Halang, Wolfgang A., Maytiyanin Komkhao, and Sunantha Sodsee. "Secure Cloud Computing." In Advances in Intelligent Systems and Computing. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06538-0_30.
Full textVaradharajan, Vijay. "Secure Networked Computing." In Information Assurance in Computer Networks. Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45116-1_5.
Full textAgrawal, Dharma P., Hongmei Deng, Rajani Poosarla, and Sugata Sanyal. "Secure Mobile Computing." In Distributed Computing - IWDC 2003. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-24604-6_26.
Full textEken, Mehmet Ali, and Pelin Angin. "Vehicular Edge Computing Security." In Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635-16.
Full textSzefer, Jakub, and Ruby B. Lee. "Hardware-Enhanced Security for Cloud Computing." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_3.
Full textHasan, A. B. M. Mehedi, Md Shamsur Rahim, Sabbir Ahmed, and Andrew Levula. "Usage of Blockchain for Edge Computing." In Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635-19.
Full textGlance, David G., and Rachel Cardell-Oliver. "Privacy of Edge Computing and IoT." In Secure Edge Computing. CRC Press, 2021. http://dx.doi.org/10.1201/9781003028635-7.
Full textKontaxis, Georgios, Michalis Polychronakis, and Angelos D. Keromytis. "Computational Decoys for Cloud Security." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_12.
Full textZhou, Wenchao. "Towards a Data-Centric Approach to Attribution in the Cloud." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_13.
Full textWu, Dinghao, Peng Liu, Qiang Zeng, and Donghai Tian. "Software Cruising: A New Technology for Building Concurrent Software Monitor." In Secure Cloud Computing. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-9278-8_14.
Full textConference papers on the topic "Secure computing"
Tyagi, Himanshu, Prakash Narayan, and Piyush Gupta. "Secure computing." In 2010 IEEE International Symposium on Information Theory - ISIT. IEEE, 2010. http://dx.doi.org/10.1109/isit.2010.5513720.
Full textYamaguchi, Hiroshi, Ryo Fujita, and Shigeo Tsujii. "Secure Semantic Computing." In 2016 IEEE Second International Conference on Multimedia Big Data (BigMM). IEEE, 2016. http://dx.doi.org/10.1109/bigmm.2016.17.
Full textBose, Pradip. "Energy-secure computing." In the 2012 ACM/IEEE international symposium. ACM Press, 2012. http://dx.doi.org/10.1145/2333660.2333662.
Full textMadden, Greg, and John B. Tyndall. "Unrestricted Secure Computing." In the 2014 ACM SIGUCCS Annual Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2661172.2661190.
Full textMukherjee, Kuntal, and G. Sahoo. "A Secure Cloud Computing." In 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC 2010). IEEE, 2010. http://dx.doi.org/10.1109/itc.2010.95.
Full textWitten, Brian. "Engineering Sufficiently Secure Computing." In 2006 22nd Annual Computer Security Applications Conference (ACSAC'06). IEEE, 2006. http://dx.doi.org/10.1109/acsac.2006.25.
Full textData, Deepesh, and Vinod M. Prabhakaran. "On coding for secure computing." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282954.
Full textTyagi, Himanshu, and Shun Watanabe. "Impossibility bounds for secure computing." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282955.
Full textNarayan, Prakash, Himanshu Tyagi, and Shun Watanabe. "Common randomness for secure computing." In 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 2015. http://dx.doi.org/10.1109/isit.2015.7282595.
Full textZhao, Ruimin, Jin Wang, Kejie Lu, et al. "Weakly Secure Coded Distributed Computing." In 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). IEEE, 2018. http://dx.doi.org/10.1109/smartworld.2018.00124.
Full textReports on the topic "Secure computing"
Parashar, Manish. Secure, Robust and Flexible Computing Platform. Defense Technical Information Center, 2012. http://dx.doi.org/10.21236/ada555208.
Full textHadley, Mark D., and Samuel L. Clements. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder). Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/989452.
Full textAderholdt, Ferrol, Blake A. Caldwell, Susan Elaine Hicks, et al. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments. Office of Scientific and Technical Information (OSTI), 2017. http://dx.doi.org/10.2172/1341562.
Full textSilverberg, Alice. Making Computing on Encrypted Data Secure and Practical. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada586876.
Full textHanushevsky, A. Peer-to-Peer Computing for Secure High Performance Data Cop. Office of Scientific and Technical Information (OSTI), 2004. http://dx.doi.org/10.2172/826702.
Full textHanushevsky, Andrew B. Peer-to-Peer Computing for Secure High Performance Data Copying. Office of Scientific and Technical Information (OSTI), 2002. http://dx.doi.org/10.2172/799054.
Full textLee, Hsien-Hsin S. TOWARD HIGHLY SECURE AND AUTONOMIC COMPUTING SYSTEMS: A HIERARCHICAL APPROACH. Office of Scientific and Technical Information (OSTI), 2010. http://dx.doi.org/10.2172/1068692.
Full textFroscher, J. N., M. Kang, J. McDermott, O. Costich, and C. E. Landwehr. A Practical Approach to High Assurance Multilevel Secure Computing Service. Defense Technical Information Center, 1994. http://dx.doi.org/10.21236/ada465588.
Full textAllende López, Marcos, Diego López, Sergio Cerón, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003313.
Full textAfrican Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.
Full text