Security-aware optimization for ubiquitous computing systems with SEAT graph approach
From MaRDI portal
Publication:355496
Recommendations
- scientific article; zbMATH DE number 1975137
- Design and analysis of a security protocol for ubiquitous environments
- A two-phase scheduling strategy for real-time applications with security requirements on heterogeneous clusters
- Contego: an adaptive framework for integrating security tasks in real-time systems
- scientific article; zbMATH DE number 5846520
Cites work
- scientific article; zbMATH DE number 1682693 (Why is no real title available?)
- scientific article; zbMATH DE number 1196650 (Why is no real title available?)
- scientific article; zbMATH DE number 2085191 (Why is no real title available?)
- scientific article; zbMATH DE number 854547 (Why is no real title available?)
- Fast hashing on the Pentium
- Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor
- Scheduling Algorithms for Multiprogramming in a Hard-Real-Time Environment
Cited in
(1)
This page was built for publication: Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q355496)