Academic literature on the topic 'Secured ubiquitous services'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secured ubiquitous services.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secured ubiquitous services"
Ogbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz, and Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security." Sensors 22, no. 16 (August 22, 2022): 6313. http://dx.doi.org/10.3390/s22166313.
Full textBouchemal, Nardjes, Ramdane Maamri, and Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance." International Journal of Ambient Computing and Intelligence 5, no. 3 (July 2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.
Full textHsu, Ching-Hsien, Jong Hyuk Park, Laurence T. Yang, and Mario Freire. "Secure communications and data management in ubiquitous services." International Journal of Communication Systems 22, no. 9 (September 2009): 1065–68. http://dx.doi.org/10.1002/dac.1057.
Full textKim, Sung-Ki, Jin-Chul Jung, Kyung-No Park, and Byoung-Joon Min. "Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States." KIPS Transactions:PartC 15C, no. 3 (June 30, 2008): 157–66. http://dx.doi.org/10.3745/kipstc.2008.15-c.3.157.
Full textHsu, Robert C., Jong Hyuk Park, Laurence T. Yang, and Mario Freire. "Call for Papers: ‘Secure Communications and Data Management in Ubiquitous Services’." International Journal of Communication Systems 21, no. 5 (2008): 569–70. http://dx.doi.org/10.1002/dac.940.
Full textZhou, Yousheng, and Longan Wang. "A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity." Security and Communication Networks 2020 (June 28, 2020): 1–19. http://dx.doi.org/10.1155/2020/2637916.
Full textAbumarshoud, Hanaa, Cheng Chen, Mohamed Sufyan Islim, and Harald Haas. "Optical wireless communications for cyber-secure ubiquitous wireless networks." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 476, no. 2242 (October 2020): 20200162. http://dx.doi.org/10.1098/rspa.2020.0162.
Full textBahl, P., W. Russell, Yi-Min Wang, A. Balachandran, G. M. Voelker, and A. Miu. "PAWNs: Satisfying the need for ubiquitos secure connectivity and location services." IEEE Wireless Communications 9, no. 1 (February 2002): 40–48. http://dx.doi.org/10.1109/mwc.2002.986457.
Full textMahmood, Zahid, Huansheng Ning, Ata Ullah, and Xuanxia Yao. "Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT." Applied Sciences 7, no. 10 (October 16, 2017): 1069. http://dx.doi.org/10.3390/app7101069.
Full textJagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (October 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.
Full textBook chapters on the topic "Secured ubiquitous services"
Green, Les, and Linas Maknavicius. "Secure Billing for Ubiquitous Service Delivery." In Performability Has its Price, 90–101. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11780502_9.
Full textEnokibori, Yu, and Nobuhiko Nishio. "Realizing a Secure Federation of Multi-institutional Service Systems." In Ubiquitous Computing Systems, 146–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11526858_12.
Full textAnzai, Jun, and Tsutomu Matsumoto. "How to Construct Secure Cryptographic Location-Based Services." In Embedded and Ubiquitous Computing – EUC 2005 Workshops, 894–904. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11596042_92.
Full textKim, Jangseong, Joonsang Baek, Kwangjo Kim, and Jianying Zhou. "A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous Computing Environments." In Public Key Infrastructures, Services and Applications, 45–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22633-5_4.
Full textXu, Hanqiu, Qingping Wang, Jing Zhou, and Ou Ruan. "An Efficient Provably Secure Password-Based Authenticated Key Agreement." In Innovative Mobile and Internet Services in Ubiquitous Computing, 423–34. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-61542-4_40.
Full textYoon, Miyeon, and Jonghyun Baek. "A Study on Framework for Developing Secure IoT Service." In Advances in Computer Science and Ubiquitous Computing, 289–94. Singapore: Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-10-0281-6_42.
Full textPark, Jong Hyuk, Ji-Sook Park, Sang-Jin Lee, and Byoung-Soo Koh. "A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home." In Ubiquitous Intelligence and Computing, 893–901. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11833529_91.
Full textDeng, Xinyang, Tianhan Gao, Nan Guo, and Kang Xie. "A Secure Data Sharing Scheme Based on CP-ABE in VANETs." In Innovative Mobile and Internet Services in Ubiquitous Computing, 65–74. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-08819-3_7.
Full textJu, Seunghwan, Jaekyoung Lee, Joonyoung Park, and Junshin Lee. "Secure Concept of SCADA Communication for Offshore Wind Energy." In Advances in Parallel and Distributed Computing and Ubiquitous Services, 91–97. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0068-3_11.
Full textYang, Jun, Ruiqing Liu, and Baojiang Cui. "Enhanced Secure ZigBee Light Link Protocol Based on Network Key Update Mechanism." In Innovative Mobile and Internet Services in Ubiquitous Computing, 343–53. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93554-6_32.
Full textConference papers on the topic "Secured ubiquitous services"
Acker, Robin, and Michael Massoth. "Secure Ubiquitous House and Facility Control Solution." In 2010 Fifth International Conference on Internet and Web Applications and Services. IEEE, 2010. http://dx.doi.org/10.1109/iciw.2010.45.
Full textPeng, Kun, and Feng Bao. "A Design of Secure Ubiquitous Network Service." In Applications (ICUT). IEEE, 2009. http://dx.doi.org/10.1109/icut.2009.5405751.
Full textTamazirt, Lotfi, Farid Alilat, and Nazim Agoulmine. "NFC-based ubiquitous monitoring system for e-industry." In 2017 Third International Conference On Mobile And Secure Services (MobiSecServ). IEEE, 2017. http://dx.doi.org/10.1109/mobisecserv.2017.7886568.
Full textJia, Hong. "Ubiquitous, Secure, and Efficient Mobile Sensing Systems." In MobiSys '23: 21st Annual International Conference on Mobile Systems, Applications and Services. New York, NY, USA: ACM, 2023. http://dx.doi.org/10.1145/3581791.3597511.
Full textTrabelsi, Slim, Jean-christphe Pazzaglia, and Yves Roudier. "Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing." In 2006 European Conference on Web Services (ECOWS'06). IEEE, 2006. http://dx.doi.org/10.1109/ecows.2006.33.
Full textKang, Kyungran, Jungtae Lee, Kyoungwon Beak, Sungeun Park, and Jaehwan Kim. "A Mobile Community Service Platform Promoting Ubiquitous Collaboration." In 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE, 2011. http://dx.doi.org/10.1109/dasc.2011.156.
Full textSuciu, George, Muneeb Anwar, and Roxana Mihalcioiu. "VIRTUALIZED VIDEO AND CLOUD COMPUTING FOR EFFICIENT ELEARNING." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-114.
Full textLeung, Adrian, and Chris J. Mitchell. "A Device Management Framework for Secure Ubiquitous Service Delivery." In 2008 Fourth International Conference on Information Assurance and Security (IAS). IEEE, 2008. http://dx.doi.org/10.1109/ias.2008.28.
Full textPark, HeeMan, YoungLok Lee, HyungHyo Lee, BongNam Noh, Theodore E. Simos, and George Psihoyios. "Secure Event Service using SPKI∕SDSI Certificate in Ubiquitous." In INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE. AIP, 2008. http://dx.doi.org/10.1063/1.3037064.
Full textGe, Meng, Kwok-Yan Lam, Jianbin Li, and Siu-Leung Chung. "Ubiquitous and Secure Certificate Service for Mobile Ad Hoc Network." In 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC). IEEE, 2008. http://dx.doi.org/10.1109/euc.2008.91.
Full textReports on the topic "Secured ubiquitous services"
African Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.
Full text