-
1
-
-
85017650857
-
Forget 'the Cloud'; 'The Fog' is Tech's Future
-
18 May
-
C. Mims, "Forget 'the Cloud'; 'The Fog' Is Tech's Future," The Wall Street J., 18 May 2014; www.wsj.com/articles/ SB10001424052702304908304579566662320279406
-
(2014)
The Wall Street J
-
-
Mims, C.1
-
3
-
-
84943612463
-
Security Privacy Issues of Fog Computing: A Survey
-
S. Yi, Z. Qin Q. Li, "Security Privacy Issues of Fog Computing: A Survey," Proc. Int'l Conf. Wireless Algorithms, Systems Applications, 2015, pp. 685-695
-
(2015)
Proc. Int'l Conf. Wireless Algorithms, Systems Applications
, pp. 685-695
-
-
Yi, S.1
Qin, Z.2
Li, Q.3
-
4
-
-
84963780985
-
Energy Management- as-A-Service over Fog Computing Platform
-
M. Al Faruque K. Vatanparvar, "Energy Management- as-A-Service Over Fog Computing Platform," IEEE Internet of Things J., vol. 3, no. 2, 2012, pp. 161-169
-
(2012)
IEEE Internet of Things J
, vol.3
, Issue.2
, pp. 161-169
-
-
Al Faruque, M.1
Vatanparvar, K.2
-
5
-
-
84872126433
-
Wake: Key management scheme for wide-area measurement systems in smart grid
-
Y.W. Law et al., "Wake: Key Management Scheme for Wide-Area Measurement Systems in Smart Grid," IEEE Communications Mag., vol. 51, no. 1, 2014, pp. 34-41
-
(2014)
IEEE Communications Mag
, vol.51
, Issue.1
, pp. 34-41
-
-
Law, Y.W.1
-
6
-
-
77950601673
-
Cloud security with virtualized defense reputation-based trust management
-
K. Hwang, S. Kulkareni Y. Hu, "Cloud Security with Virtualized Defense Reputation-Based Trust Management," Proc. 8th IEEE Int'l Conf. Dependable, Autonomic Secure Computing (DASC), 2009, pp. 717-722
-
(2009)
Proc. 8th IEEE Int'l Conf. Dependable, Autonomic Secure Computing (DASC)
, pp. 717-722
-
-
Hwang, K.1
Kulkareni, S.2
Hu, Y.3
-
7
-
-
51349162676
-
A hybrid rogue access point protection framework for commodity wi-fi networks
-
L. Ma, A.Y. Teymorian X. Cheng, "A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks," Proc. 27th IEEE Conf. Computer Comm., 2008; doi:10.1109/infocom.2008.178
-
(2008)
Proc. 27th IEEE Conf. Computer Comm
-
-
Ma, L.1
Teymorian, A.Y.2
Cheng, X.3
-
8
-
-
84861597427
-
MobiShare: Flexible privacy- preserving location sharing in mobile online social networks
-
W. Wei, F. Xu Q. Li, "MobiShare: Flexible Privacy- Preserving Location Sharing in Mobile Online Social Networks," Proc. IEEE Conf. Computer Comm., 2012, pp. 2616-2620
-
(2012)
Proc. IEEE Conf. Computer Comm
, pp. 2616-2620
-
-
Wei, W.1
Xu, F.2
Li, Q.3
-
9
-
-
84859045535
-
On the release of crls in public key infrastructure
-
article no. 2
-
C. Ma, N. Hu Y. Li, "On the Release of CRLs in Public Key Infrastructure," Proc. 15th Usenix Security Symp., vol. 15, 2006, article no. 2
-
(2006)
Proc. 15th Usenix Security Symp
, vol.15
-
-
Ma, C.1
Hu, N.2
Li, Y.3
-
10
-
-
84893081685
-
The case for prefetching prevalidating TLS server certificates
-
E. Stark et al., "The Case for Prefetching Prevalidating TLS Server Certificates," Proc. 19th Ann. Network &Distributed System Security Symp., 2012; www. internetsociety.org/sites/default/files/12-4.pdf
-
(2012)
Proc. 19th Ann. Network &Distributed System Security Symp
-
-
Stark, E.1
-
11
-
-
84978035510
-
X. 509 Check: A Tool to Check the Safety Security of Digital Certificates
-
A. Alrawais, A. Alhothaily X. Cheng, "X. 509 Check: A Tool to Check the Safety Security of Digital Certificates," Proc. Int'l Conf. Identification, Information Knowledge in the Internet of Things, 2015, pp. 130-133
-
(2015)
Proc. Int'l Conf. Identification, Information Knowledge in the Internet of Things
, pp. 130-133
-
-
Alrawais, A.1
Alhothaily, A.2
Cheng, X.3
-
15
-
-
84942369666
-
A novel verification method for payment card systems
-
A. Alhothaily, A. Alrawais X. Cheng, "A Novel Verification Method for Payment Card Systems," J. Personal Ubiquitous Computing, vol. 19, no. 7, 2015, pp. 1145-1156
-
(2015)
J. Personal Ubiquitous Computing
, vol.19
, Issue.7
, pp. 1145-1156
-
-
Alhothaily, A.1
Alrawais, A.2
Cheng, X.3
-
16
-
-
84939506714
-
Cloudlet mesh for securing mobile clouds from intrusions network attacks
-
Y. Shi, S. Abhilash K. Hwang, "Cloudlet Mesh for Securing Mobile Clouds from Intrusions Network Attacks," Proc. 3rd IEEE Int'l Conf. Mobile Cloud Computing, Services Eng., 2015, pp. 109-118
-
(2015)
Proc. 3rd IEEE Int'l Conf. Mobile Cloud Computing, Services Eng
, pp. 109-118
-
-
Shi, Y.1
Abhilash, S.2
Hwang, K.3
|