The Ninth International Conference on Mobile Data Management (Mdm 2008) 2008
DOI: 10.1109/mdm.2008.32
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Sharing in Mobile Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2015
2015

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…The solution enhances existing security protocols by reducing their current complexity and computation cost. It has been designed to meet the following fundamental requirements as defined in [20]:…”
Section: Proposed Work and Contributionmentioning
confidence: 99%
See 4 more Smart Citations
“…The solution enhances existing security protocols by reducing their current complexity and computation cost. It has been designed to meet the following fundamental requirements as defined in [20]:…”
Section: Proposed Work and Contributionmentioning
confidence: 99%
“…For this research, we use softwarebased cryptography solution due to its low deployment cost, high usability and interoperability between mobile devices with different platforms. We assume that the 20 underlying operating system of the mobile device is robust and secures the shared memory used for performing cryptographic operations. …”
Section: Securing Data Privacymentioning
confidence: 99%
See 3 more Smart Citations