Journal articles on the topic 'Ubiquitous Computing Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Ubiquitous Computing Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Hayat, Zia, Jeff Reeve, and Chris Boutle. "Ubiquitous security for ubiquitous computing." Information Security Technical Report 12, no. 3 (2007): 172–78. http://dx.doi.org/10.1016/j.istr.2007.05.002.
Full textSharma, Priti, and Nidhi Goel. "Security Issues in Ubiquitous Computing: A Literature Review." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (2017): 17. http://dx.doi.org/10.23956/ijarcsse.v7i8.10.
Full textChen, Wen Gang, Xiao Jie Song, and Wei Liu. "Research of Information Security Framework in Ubiquitous Environment." Advanced Materials Research 433-440 (January 2012): 1397–99. http://dx.doi.org/10.4028/www.scientific.net/amr.433-440.1397.
Full textKhan, M. Fahim Ferdous, and Ken Sakamura. "The Context-Security Nexus in Ubiquitous Computing." International Journal of Adaptive, Resilient and Autonomic Systems 5, no. 3 (2014): 61–81. http://dx.doi.org/10.4018/ijaras.2014070104.
Full textJoshi, Anupam, Tim Finin, Lalana Kagal, Jim Parker, and Anand Patwardhan. "Security policies and trust in ubiquitous computing." Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 366, no. 1881 (2008): 3769–80. http://dx.doi.org/10.1098/rsta.2008.0142.
Full textKim, Jongsung, Jiqiang Lu, and Ching-Hsien Hsu. "Advanced security technologies and applications for ubiquitous computing." Personal and Ubiquitous Computing 17, no. 5 (2012): 835–36. http://dx.doi.org/10.1007/s00779-012-0533-2.
Full textWeippl, E., A. Holzinger, and A. M. Tjoa. "Security aspects of ubiquitous computing in health care." e & i Elektrotechnik und Informationstechnik 123, no. 4 (2006): 156–61. http://dx.doi.org/10.1007/s00502-006-0336.
Full textStajano, F., and R. Anderson. "The Resurrecting Duckling: security issues for ubiquitous computing." Computer 35, no. 4 (2002): supl22—supl26. http://dx.doi.org/10.1109/mc.2002.1012427.
Full textSandhu, Reema. "SHIFTING PARADIGM FROM MOBILE COMPUTING TO UBIQUITOUS/PERVASIVE COMPUTING." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 11 (2013): 360–63. https://doi.org/10.5281/zenodo.14613505.
Full textEma, Arisa, and Yuko Fujigaki. "How far can child surveillance go?: Assessing the parental perceptions of an RFID child monitoring system in Japan." Surveillance & Society 9, no. 1/2 (2011): 132–48. http://dx.doi.org/10.24908/ss.v9i1/2.4105.
Full textLee, Jae Dong, Hyung Jin Im, Won Min Kang, and Jong Hyuk Park. "Ubi-RKE: A Rhythm Key Based Encryption Scheme for Ubiquitous Devices." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/683982.
Full textJagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Full textYAMADA, S. "Access Control for Security and Privacy in Ubiquitous Computing Environments." IEICE Transactions on Communications E88-B, no. 3 (2005): 846–56. http://dx.doi.org/10.1093/ietcom/e88-b.3.846.
Full textOgiela, Marek R., Aniello Castiglione, and Ilsun You. "Soft computing for security services in smart and ubiquitous environments." Soft Computing 18, no. 9 (2014): 1655–58. http://dx.doi.org/10.1007/s00500-014-1380-z.
Full textLee, Seongkee, Sanghoon Lee, Taein Kang, Miyoung Kwon, Nohbok Lee, and Hoonkyu Kim. "Resiliency of mobile OS security for secure personal ubiquitous computing." Personal and Ubiquitous Computing 22, no. 1 (2017): 23–34. http://dx.doi.org/10.1007/s00779-017-1098-x.
Full textOsborn, Emma, and Andrew Simpson. "On Safety and Security Requirements in Emerging Ubiquitous Computing Models." Computer Journal 59, no. 4 (2015): 570–91. http://dx.doi.org/10.1093/comjnl/bxv085.
Full textHoang, Nguyen Van. "Multi-Access Edge Computing Architecture and Smart Agriculture Application in Ubiquitous Power Internet of Things." International Journal of Mobile Network Communications & Telematics 13, no. 4 (2023): 01–19. http://dx.doi.org/10.5121/ijmnct.2023.13401.
Full textMa, Tinghuai, Sen Yan, Jin Wang, and Sungyoung Lee. "Privacy preserving in ubiquitous computing: Classification & hierarchy." Computer Science and Information Systems 8, no. 4 (2011): 1185–206. http://dx.doi.org/10.2298/csis110315055m.
Full textAdithya, B., and B. Sathish Babu. "Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 4 (2012): 7–18. http://dx.doi.org/10.4018/japuc.2012100102.
Full textCalhau, Flavio, Romildo Bezerra, Flavia Nascimento, and Joberto Martins. "An Autonomic and Ubiquitous Framework for Smart Grid Management." International Journal of Innovative Computing, Information and Control 11, no. 4 (2015): 1369–97. https://doi.org/10.5281/zenodo.3525882.
Full textYou, Ilsun, and Witold Pedrycz. "Editorial: Advanced intelligent and security services in mobile and ubiquitous computing." Journal of Intelligent Manufacturing 23, no. 4 (2010): 1257–58. http://dx.doi.org/10.1007/s10845-010-0408-1.
Full textQiu, Meikang, Lei Zhang, Zhong Ming, Zhi Chen, Xiao Qin, and Laurence T. Yang. "Security-aware optimization for ubiquitous computing systems with SEAT graph approach." Journal of Computer and System Sciences 79, no. 5 (2013): 518–29. http://dx.doi.org/10.1016/j.jcss.2012.11.002.
Full textYicheng, Chen, Zou Xuecheng, Liu Zhenglin, Han Yu, and Zheng Zhaoxia. "Energy-efficient and security-optimized AES hardware design for ubiquitous computing." Journal of Systems Engineering and Electronics 19, no. 4 (2008): 652–58. http://dx.doi.org/10.1016/s1004-4132(08)60134-6.
Full textBoukerche, Azzedine, and Yonglin Ren. "A trust-based security system for ubiquitous and pervasive computing environments." Computer Communications 31, no. 18 (2008): 4343–51. http://dx.doi.org/10.1016/j.comcom.2008.05.007.
Full textMhetre, Nalini A., Arvind V. Deshpande, and Parikshit Narendra Mahalle. "Trust Management Model based on Fuzzy Approach for Ubiquitous Computing." International Journal of Ambient Computing and Intelligence 7, no. 2 (2016): 33–46. http://dx.doi.org/10.4018/ijaci.2016070102.
Full textAli, Ali. "Securing Pervasive Computing Networks: Enhancing Network Security via Network Virtualization in Wireless Communications Infrastructure." Journal of Intelligent Systems and Internet of Things 12, no. 2 (2024): 75–88. http://dx.doi.org/10.54216/jisiot.120206.
Full textSánchez, Daniel, Andrés López, Florina Mendoza, and Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT." Proceedings 2, no. 19 (2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.
Full textZhou, Xiao Yan, Zhi Hua Hu, and Jian Kun Shun. "Security Architecture of Digital Library Research in General Knowledge Environment." Applied Mechanics and Materials 198-199 (September 2012): 601–5. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.601.
Full textShe, Xin Ping, and Jian Ming Xu. "Wireless LAN Security Enhancement through Trusted Computing Technology." Applied Mechanics and Materials 577 (July 2014): 986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.577.986.
Full textShin, Dong Hee. "Ubiquitous Computing Acceptance Model: end user concern about security, privacy and risk." International Journal of Mobile Communications 8, no. 2 (2010): 169. http://dx.doi.org/10.1504/ijmc.2010.031446.
Full textBardram, Jakob E. "The trouble with login: on usability and computer security in ubiquitous computing." Personal and Ubiquitous Computing 9, no. 6 (2005): 357–67. http://dx.doi.org/10.1007/s00779-005-0347-6.
Full textChang, Chin-Chen, Iuon-Chang Lin, and Chia-Chi Wu. "A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.
Full textD., S. Shelar, .G. Andhare P, B. Gaikwad S., and A. Thakre P. "A MATHEMATICAL MODEL FOR ACCESS CONTROL THROUGH TRUST MANAGEMENT IN UBIQUITOUS COMPUTING." Stochastic Modeling & Applications Vol. 26 No. 3, January - June, Special Issue 2022 Part - 2 (2022): 1002–9. https://doi.org/10.5281/zenodo.6572635.
Full textM, Varaprasad Rao1, and Ch Bharta Chryulu N. "SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS." International Journal of Ubiquitous Computing (IJU) 6, no. 2 (2023): 7. https://doi.org/10.5281/zenodo.8233607.
Full textAbbagalla, Sindhooja, and Srividhya Gavini. "SMART SECURITY SOLUTIONS FOR CLOUD INFRASTRUCTURE USING MACHINE LEARNING." International Journal of Interpreting Enigma Engineers 01, no. 02 (2024): 08–14. http://dx.doi.org/10.62674/ijiee.2024.v1i02.002.
Full textQian, Xiaojun, and Xiaoping Che. "Security-enhanced Search Engine Design in Internet of Things." JUCS - Journal of Universal Computer Science 18, no. (9) (2012): 1218–35. https://doi.org/10.3217/jucs-018-09-1218.
Full textAdamski, Marcin, Krzysztof Kurowski, Marek Mika, Wojciech Piątek, and Jan Węglarz. "Security Aspects in Resource Management Systems in Distributed Computing Environments." Foundations of Computing and Decision Sciences 42, no. 4 (2017): 299–313. http://dx.doi.org/10.1515/fcds-2017-0015.
Full textJain, Arushi, and Vishal Bhatnagar. "Concoction of Ambient Intelligence and Big Data for Better Patient Ministration Services." International Journal of Ambient Computing and Intelligence 8, no. 4 (2017): 19–30. http://dx.doi.org/10.4018/ijaci.2017100102.
Full textPatalbansi, Vikram, and Dr G. Prasanna Laxmi. "Mobile Cloud Computing Cryptographic Scheme." Journal of University of Shanghai for Science and Technology 23, no. 06 (2021): 1148–57. http://dx.doi.org/10.51201/jusst/21/05394.
Full textBouchemal, Nardjes, Ramdane Maamri, and Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance." International Journal of Ambient Computing and Intelligence 5, no. 3 (2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.
Full textSong, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, and Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.
Full textZeng, Xianquan. "Research on Information Security Interaction Mode of Mobile Devices Based on Ubiquitous Computing." Open Automation and Control Systems Journal 7, no. 1 (2015): 805–8. http://dx.doi.org/10.2174/1874444301507010805.
Full textPark, James, and Wanlei Zhou. "Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing." Entropy 18, no. 9 (2016): 334. http://dx.doi.org/10.3390/e18090334.
Full textWang, Guojun, Jianhua Ma, and Laurence T. Yang. "Guest Editorial: Special Issue on Safety and Security for Ubiquitous Computing and Communications." Information Sciences 522 (June 2020): 317–18. http://dx.doi.org/10.1016/j.ins.2020.02.036.
Full textPark, Jong Hyuk. "Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications." International Journal of Communication Systems 22, no. 8 (2009): 959–69. http://dx.doi.org/10.1002/dac.1008.
Full textKusen, Ema, and Mark Strembeck. "A decade of security research in ubiquitous computing: results of a systematic literature review." International Journal of Pervasive Computing and Communications 12, no. 2 (2016): 216–59. http://dx.doi.org/10.1108/ijpcc-03-2016-0018.
Full textOlaniyi, Oluwaseun Oladeji, Olalekan Jamiu Okunleye, Samuel Oladiipo Olabanji, Christopher Uzoma Asonze, and Samson Abidemi Ajayi. "IoT Security in the Era of Ubiquitous Computing: A Multidisciplinary Approach to Addressing Vulnerabilities and Promoting Resilience." Asian Journal of Research in Computer Science 16, no. 4 (2023): 354–71. http://dx.doi.org/10.9734/ajrcos/2023/v16i4397.
Full textSahmim Ep Guerbouj, Syrine, Hamza Gharsellaoui, and Sadok Bouamama. "A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things." International Journal of Service Science, Management, Engineering, and Technology 10, no. 3 (2019): 32–44. http://dx.doi.org/10.4018/ijssmet.2019070103.
Full textPalesandro, Alex, Guegan Chirine Ghedira, Marc Lacoste, and Nadia Bennani. "Overcoming Barriers for Ubiquitous User- Centric Healthcare Services." IEEE Cloud Computing 3, no. 6 (2016): 64–74. https://doi.org/10.1109/MCC.2016.131.
Full textAbed, Amira Hassan. "The Techniques of authentication in the Context of Cloud Computing." International Journal of Advanced Networking and Applications 16, no. 04 (2025): 6515–22. https://doi.org/10.35444/ijana.2025.16408.
Full text