While mobile encounters with clouds

Man Ho Au, Kaitai Liang*, Joseph K. Liu, Rongxing Lu

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

3 Citations (Scopus)


To date the considerable computation and storage power of clouds that have attracted great attention from mobile users and mobile service providers over the past few years. The convergence of mobile devices and clouds that leads to a brand new era of could-based mobile applications. It brings long-listed advantages for mobile users to get rid of the constraints of mobile devices (including limited mobile memory, data processing ability and battery). However, mobile clouds yield new security and privacy risks in open network setting. This survey paper attempts to introduce security risks on mobile clouds in the view point of applied cryptography.

Original languageEnglish
Title of host publicationNetwork and System Security - 10th International Conference, NSS 2016, Proceedings
PublisherSpringer Verlag
Number of pages16
Volume9955 LNCS
ISBN (Print)9783319462974
Publication statusPublished - 2016
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Network and System Security - Taipei, Taiwan, Republic of China
Duration: 28 Sep 201630 Sep 2016
Conference number: 10

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9955 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349


ConferenceInternational Conference on Network and System Security
Abbreviated titleNSS
CountryTaiwan, Republic of China

Fingerprint Dive into the research topics of 'While mobile encounters with clouds'. Together they form a unique fingerprint.

Cite this