While mobile encounters with clouds

Man Ho Allen Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

3 Citations (Scopus)

Abstract

To date the considerable computation and storage power of clouds that have attracted great attention from mobile users and mobile service providers over the past few years. The convergence of mobile devices and clouds that leads to a brand new era of could-based mobile applications. It brings long-listed advantages for mobile users to get rid of the constraints of mobile devices (including limited mobile memory, data processing ability and battery). However, mobile clouds yield new security and privacy risks in open network setting. This survey paper attempts to introduce security risks on mobile clouds in the view point of applied cryptography.
Original languageEnglish
Title of host publicationNetwork and System Security - 10th International Conference, NSS 2016, Proceedings
PublisherSpringer Verlag
Pages3-18
Number of pages16
ISBN (Print)9783319462974
DOIs
Publication statusPublished - 1 Jan 2016
Event10th International Conference on Network and System Security, NSS 2016 - Taipei, Taiwan
Duration: 28 Sept 201630 Sept 2016

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9955 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Network and System Security, NSS 2016
Country/TerritoryTaiwan
CityTaipei
Period28/09/1630/09/16

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'While mobile encounters with clouds'. Together they form a unique fingerprint.

Cite this