Security-aware optimization for ubiquitous computing systems with SEAT graph approach
From MaRDI portal
Publication:355496
DOI10.1016/J.JCSS.2012.11.002zbMATH Open1268.68078OpenAlexW2117278106MaRDI QIDQ355496FDOQ355496
Authors: Meikang Qiu, Lei Zhang, Zhong Ming, Zhi Chen, Xiao Qin, Laurence T. Yang
Publication date: 24 July 2013
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2012.11.002
Recommendations
- scientific article; zbMATH DE number 1975137
- Design and analysis of a security protocol for ubiquitous environments
- A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters
- Contego: an adaptive framework for integrating security tasks in real-time systems
- scientific article; zbMATH DE number 5846520
Cites Work
- Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast hashing on the Pentium
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
- Title not available (Why is that?)
Cited In (1)
This page was built for publication: Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q355496)