2017
DOI: 10.1007/s11277-017-3955-3
|View full text |Cite
|
Sign up to set email alerts
|

ICT-Based Wireless Personal Computing

Abstract: Information and communications technologies (ICT)-based wireless personal computing has created increasing interest in convergence technology-based personal services, in which personal equipment is combined with wireless network-based services. Smart services, in which convergence technology services and hybrid peer-to-peer, personal environment network technology plus wireless network information technology are combined, are future-oriented. With the emergence of the smart mobile age, personal users can enjoy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…In addition, in the field of security services, companies and research institutes have been continuously developing solutions using hacking and convergence computing [10][11][12]. This issue covers some of the hottest topics in hacking and convergence computing, including: hacking in convergence computing; electronics hacking, hardware hacking; communication protocol hacking; information indexing, searching, and visualization; secure and anti-hacking; network connection solution; secure virtual network embedding algorithms; secure information authentication protocol; security framework; secure IoT and protocol; privacy and authentication for network; security in convergence computing; cybersecurity; innovative applications of hacking, security computing.…”
mentioning
confidence: 99%
“…In addition, in the field of security services, companies and research institutes have been continuously developing solutions using hacking and convergence computing [10][11][12]. This issue covers some of the hottest topics in hacking and convergence computing, including: hacking in convergence computing; electronics hacking, hardware hacking; communication protocol hacking; information indexing, searching, and visualization; secure and anti-hacking; network connection solution; secure virtual network embedding algorithms; secure information authentication protocol; security framework; secure IoT and protocol; privacy and authentication for network; security in convergence computing; cybersecurity; innovative applications of hacking, security computing.…”
mentioning
confidence: 99%