Login / Signup

An efficient security algorithm in mobile computing for resource constrained mobile devices.

Janet LightDeepika David
Published in: Q2SWinet (2008)
Keyphrases
  • mobile devices
  • mobile computing
  • resource constrained
  • sensor networks
  • context aware
  • np hard
  • data mining
  • simulated annealing
  • constraint satisfaction problems
  • mobile learning
  • mobile applications
  • mobile users