-
5
-
-
85015043454
-
-
Fitocracy
-
Fitocracy (2015) Fitocracy. https://www.fitocracy.com/
-
(2015)
Fitocracy
-
-
-
7
-
-
84991232220
-
-
MIOLink
-
MIOLink (2015) Mio train with heart. http://www.mioglobal.com
-
(2015)
Mio train with heart
-
-
-
8
-
-
84866627419
-
Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM
-
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the first edition of the MCC workshop on Mobile cloud computing, ACM, pp 13–16
-
(2012)
Pp 13–16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
11
-
-
84937542853
-
A cost-effective pay-per-multiplication comparison method for millionaires. In: Topics in Cryptology CT-RSA 2001, Springer
-
Fischlin M (2001) A cost-effective pay-per-multiplication comparison method for millionaires. In: Topics in Cryptology CT-RSA 2001, Springer. pp 457–471
-
(2001)
Pp 457–471
-
-
Fischlin, M.1
-
12
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
Sweeney Latanya (2002) Achieving k-anonymity privacy protection using generalization and suppression. Int J Uncertain Fuzziness Knowl Based Syst 10(05):571–588
-
(2002)
Int J Uncertain Fuzziness Knowl Based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
13
-
-
0036811662
-
k-anonymity: a model for protecting privacy
-
Sweeney Latanya (2002) k-anonymity: a model for protecting privacy. Int J Uncertain Fuzziness Knowl Based Syst 10(05):557–570
-
(2002)
Int J Uncertain Fuzziness Knowl Based Syst
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
14
-
-
38049029760
-
Encryption techniques for secure database outsourcing. In: Computer Security–ESORICS 2007, Springer
-
Evdokimov S, Günther O (2007) Encryption techniques for secure database outsourcing. In: Computer Security–ESORICS 2007, Springer, pp 327–342
-
(2007)
Pp 327–342
-
-
Evdokimov, S.1
Günther, O.2
-
15
-
-
70349303408
-
A data outsourcing architecture combining cryptography and access control
-
ACM workshop on Computer security architecture, ACM
-
De Capitani S, Di Vimercati FS, Jajodia S, Paraboschi S, Samarati P (2007) A data outsourcing architecture combining cryptography and access control. In: Proceedings of the 2007 ACM workshop on Computer security architecture, ACM, pp 63–69
-
(2007)
Proceedings of the
, vol.2007
, pp. 63-69
-
-
De Capitani, S.1
Di Vimercati, F.S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
16
-
-
84868321103
-
-
Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N
-
Curino C, Jones EPC, Popa RA, Malviya N, Wu E, Madden S, Balakrishnan H, Zeldovich N (2011) Relational cloud: a database-as-a-service for the cloud
-
(2011)
Relational cloud: a database-as-a-service for the cloud
-
-
-
17
-
-
77957936026
-
-
Google
-
Google (2013) Google app engine. https://cloud.google.com/products/app-engine
-
(2013)
Google app engine
-
-
-
18
-
-
84954148130
-
Lu S (2015) The fog computing service for healthcare
-
Ubi-HealthTech: IEEE
-
Shi Y, Ding G, Wang H, Roman HE, Lu S (2015) The fog computing service for healthcare. In: 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech), IEEE, pp 1–5
-
2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare
, pp. 1-5
-
-
Shi, Y.1
Ding, G.2
Wang, H.3
Roman, H.E.4
-
20
-
-
84864275237
-
Fog computing: mitigating insider data theft attacks in the cloud
-
IEEE Symposium on Security and Privacy Workshops (SPW), IEEE
-
Stolfo SJ, Salem MB, Keromytis AD (2012) Fog computing: mitigating insider data theft attacks in the cloud. In: 2012 IEEE Symposium on Security and Privacy Workshops (SPW), IEEE, pp 125–128
-
(2012)
In
, vol.2012
, pp. 125-128
-
-
Stolfo, S.J.1
Salem, M.B.2
Keromytis, A.D.3
-
21
-
-
84983103058
-
Key ingredients in an iot recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)
-
Yannuzzi M, Milito R, Serral-Gracia R, Montero D, Nemirovsky M (2014) Key ingredients in an iot recipe: fog computing, cloud computing, and more fog computing. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp 325–329
-
(2014)
Pp 325–329
-
-
Yannuzzi, M.1
Milito, R.2
Serral-Gracia, R.3
Montero, D.4
Nemirovsky, M.5
-
22
-
-
84937439454
-
Trapdooring discrete logarithms on elliptic curves over rings
-
Springer, Berlin, Heidelberg
-
Paillier P (2000) Trapdooring discrete logarithms on elliptic curves over rings. In: Okamoto T (ed) Advances in CryptologyASI—ACRYPT 2000. Springer, Berlin, Heidelberg, pp 573–584
-
(2000)
Advances in CryptologyASI—ACRYPT
, vol.2000
, pp. 573-584
-
-
Paillier, P.1
Okamoto, T.2
-
23
-
-
84942550998
-
-
Berlin, Heidelberg
-
Paillier P (1999) Public key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT’99, Springer-Verlag, Berlin, Heidelberg, pp 223–238
-
(1999)
Public key cryptosystems based on composite degree residuosity classes. In: Proceedings of the 17th international conference on Theory and application of cryptographic techniques, EUROCRYPT’99, Springer-Verlag
, pp. 223-238
-
-
Paillier, P.1
-
24
-
-
77952193706
-
A cloud computing solution for patient’s data collection in health care institutions. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10, IEEE, pp
-
Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS (2010) A cloud computing solution for patient’s data collection in health care institutions. In: Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010. ETELEMED’10, IEEE, pp. 95–99
-
(2010)
-
-
Rolim, C.O.1
Koch, F.L.2
Westphall, C.B.3
Werner, J.4
Fracalossi, A.5
Salvador, G.S.6
-
26
-
-
84938677693
-
Mobile gateway for ubiquitous health care system using zigbee and bluetooth. In: 014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2. IEEE
-
Laine TH, Lee C, Suk H (2014) Mobile gateway for ubiquitous health care system using zigbee and bluetooth. In: 014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2. IEEE, pp 139–145
-
(2014)
Pp 139–145
-
-
Laine, T.H.1
Lee, C.2
Suk, H.3
-
27
-
-
79958071660
-
Personal gateway in mobile health monitoring. In: 011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2. IEEE
-
Yang S, Gerla M (2011) Personal gateway in mobile health monitoring. In: 011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), 2. IEEE, pp 636–641
-
(2011)
Pp 636–641
-
-
Yang, S.1
Gerla, M.2
-
28
-
-
84883732282
-
Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing. ACM
-
Hong K, Lillethun D, Ramachandran U, Ottenwälder B, Koldehofe B (2013) Mobile fog: a programming model for large-scale applications on the internet of things. In: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing. ACM, pp 15–20
-
(2013)
Pp 15–20
-
-
Hong, K.1
Lillethun, D.2
Ramachandran, U.3
Ottenwälder, B.4
Koldehofe, B.5
-
30
-
-
84921681652
-
Lee S (2014) Adaptive user interface and user experience based authoring tool for recommendation systems
-
Personalisation and User Adapted Services, Springer
-
Hussain J, Khan WA, Afzal M, Hussain M, Kang BH, Lee S (2014) Adaptive user interface and user experience based authoring tool for recommendation systems. In: Ubiquitous Computing and Ambient Intelligence. Personalisation and User Adapted Services. Springer, pp 136–142
-
Ubiquitous Computing and Ambient Intelligence
, pp. 136-142
-
-
Hussain, J.1
Khan, W.A.2
Afzal, M.3
Hussain, M.4
Kang, B.H.5
|