A survey on energy-aware security mechanisms

A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet
imposes to deepen the investigation of security aspects. In parallel, their power constrained …

[PDF][PDF] Security Issues and Attacks on the GSM Standard: a Review.

G Cattaneo, G De Maio, UF Petrillo - J. Univers. Comput. Sci., 2013 - academia.edu
The Global Systems for Mobile communications (GSM) is actually the most widespread
mobile communication technology existing nowadays. Despite being a mature technology …

Towards a systemic framework for digital forensic readiness

M Elyas, SB Maynard, A Ahmad… - Journal of Computer …, 2014 - Taylor & Francis
Although digital forensics has traditionally been associated with law enforcement, the impact
of new regulations, industry standards and cyber-attacks, combined with a heavy reliance on …

[HTML][HTML] Resource efficiency, privacy and security by design: a first experience on enterprise servers and data storage products triggered by a policy process

D Polverini, F Ardente, I Sánchez, F Mathieux… - computers & …, 2018 - Elsevier
Decreasing the environmental impacts of Information and Communication Technologies
(ICT) devices, whilst at the same time contributing to ensure the data protection and …

Text compression and encryption through smart devices for mobile communication

R Pizzolante, B Carpentieri… - … on Innovative Mobile …, 2013 - ieeexplore.ieee.org
Today's life of e-citizens relies more and more on the" always-on" paradigm. This
transformed our lives in a way that it is difficult, and sometimes impossible, to deal with day …

A novel steganography approach for voice over IP

Z Wei, B Zhao, B Liu, J Su, L Xu, E Xu - Journal of Ambient Intelligence …, 2014 - Springer
In homeland defense and security, secure data transfer is still critical challenging due to the
open nature of Internet. One of the solutions which came to the rescue is the VoIP (Voice …

Model driven design and evaluation of security level in orchestrated cloud services

F Amato, N Mazzocca, F Moscato - Journal of Network and Computer …, 2018 - Elsevier
Cloud-based architectures, services and resources are growing up in complexity day by day.
Composition and Orchestration deal with the problem of creating complex services …

An energy-aware framework for reliable and secure end-to-end ubiquitous data communications

A Castiglione, A De Santis… - 2013 5th …, 2013 - ieeexplore.ieee.org
Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi
coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile …

BVPSMS: A batch verification protocol for end-to-end secure SMS for mobile users

N Saxena, H Shen, N Komninos… - … on Dependable and …, 2018 - ieeexplore.ieee.org
Short Message Service (SMS) is a widely used communication medium for mobile
applications, such as banking, social networking, and e-commerce. Applications of SMS …

Secure and distributed video surveillance via portable devices

P Albano, A Bruno, B Carpentieri, A Castiglione… - Journal of Ambient …, 2014 - Springer
In this work we present a system for distributed video surveillance based on the Client-
Server model. The system we present can be accessed via portable devices. In many real …