لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
Billion Smatphone Users by 2015: 83% of Internet usage from ...
Database Review and Security Aspects, International Journal Mobileه 12. Bhagat, ...
IAMR Group of Institutions, (2011) "Security in Mobile Database Systems", ...
Al-Muhtadi J et al., (2003)"Crberus: A context-aware security scheme for ...
Covington M. J. et al., (2001) "Securing context-aware applications using ...
Myles G. et al., (2003)"Preserving privacy in environmens with location-based ...
Minami K. et al., (2005)"Secure con text-sensitive authorization, " Pervasive ...
Edjlali G. et al., (1 99 8); 'History-based access Control ...
Evans D. et al., (1 999)"Flexible p olicy-directed code safety, ...
Song Y. et al., (2004)"Rico: A security proxy for mobile ...
Ghorbanzadeh P., et al, (2010) _ Survey of Mobile Database ...
Zhang, T. et al., (2013) :Status Quo and Prospect on ...
Heikkila, F. M., (2007) "Encryption _ Security Considerations for Portable ...
Kri shnamurthy, R. P., (2001) "Encryption and Power Consumption in ...
Selvarani, D. R., (2013) "Issues, Solutions and R ecomm endations ...
Dash S., (2011) _ the Annals of Mobile Database Security" ...
Lopes, H., (2013) "Comparative Analysis of Mobile Security Threats And ...
Sesay S. et al., (2005)"A Secure database encryption scheme." In ...
Badamas, M.A., (2001) "Mobile Computer Systems _ Security Co nsiderations" ...
Bouganim, L., et al (2002) "Chip-Secured Data Access: Confidential Data ...
Corp., O., (2002) "Advanced Security Administrator 's Guide", Release2, (9.2). ...
Hwang M. et al., (1995)"A two-phase encryption scheme for enhancing ...
Ge T. et al., (2007)"Fast, Secure encryption for indexing in ...
Dato Sharing in Mobile Environmen ts", In the Secureء 24. ...
Chang, Ch.-Ch. Et al., (2003)"A database record encryption scheme using ...
Shmueli E., , (2014 "Implementing a database encryption solution, design ...
Wesley Chou, (2008) _ _ Considerations for an Efficient Mobile ...
Yu Chen et al., (2009) _ Self-En cryption Scheme for ...
Wang H., et al., (2010):The Analysis of the Security Strategy ...
Selvarani D. R., (2010) _ Secured Paradigm for Mobile Databases", ...
J. Jegadish Kumar et al., (2010) _ Imp lementation of ...
Praveen Kumar B. et al., (20 10)"Improving the Performance of ...
Eun Su Jeong et al., (2013)"A generic partial encryption scheme ...
نمایش کامل مراجع