Secured fault tolerant mobile computing

N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Checkpointing algorithms in mobile computing systems suffer from security attacks. Checkpoint data being stored in stable storage or being transferred over the wireless network is the source of information leakage. Secured Checkpointing comes with computational and storage overhead. In resource constrained mobile computing systems overhead optimization is a challenge. In this paper we propose a secured fault tolerant algorithm which combines movement based checkpointing algorithm with public key cryptography. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Biswas, S., & Neogy, S. (2011). Secured fault tolerant mobile computing. In Communications in Computer and Information Science (Vol. 191 CCIS, pp. 417–429). https://doi.org/10.1007/978-3-642-22714-1_43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free