Login / Signup
An efficient security algorithm in mobile computing for resource constrained mobile devices.
Janet Light
Deepika David
Published in:
Q2SWinet (2008)
Keyphrases
</>
mobile devices
mobile computing
resource constrained
sensor networks
context aware
np hard
data mining
simulated annealing
constraint satisfaction problems
mobile learning
mobile applications
mobile users