Search
Now showing items 1-1 of 1
Implementing data integrity and confidentiality in mobile phone based cyber foraging system
(University of Nairobi, 2014)
Following the emergence of cyber foraging systems small resource constrained mobile phone
devices are able to offload some of their resource intensive work to computationally powerful
surrogate computers accessible on ...