Toward designing an adaptive communication security for the next-generation mobile computing.
Abdulmonem M. RashwanAbd-Elhamid M. TahaHossam S. HassaneinAyman RadwanPublished in: ICC (2016)
Keyphrases
- mobile computing
- low bandwidth
- mobile computing environment
- computing paradigm
- mobile devices
- wireless networks
- context aware
- mobile users
- mobile environments
- ubiquitous computing
- wireless communication
- data management
- data collection
- mobile agents
- transaction processing
- computing environments
- communication networks
- location dependent
- pervasive computing
- intrusion detection
- communication cost
- computer networks
- distributed systems
- transaction model
- data mining
- mobile phone
- network traffic
- user interaction