-
1
-
-
84963732123
-
Internet of things in the 5g era: Enablers, architecture, and business Models
-
M.R. Palattella, M. Dohler, A. Grieco, G. Rizzo, J. Torsner, T. Engel, et al., "Internet of Things in the 5G Era: Enablers, Architecture, and Business Models," IEEE J. Selected Areas in Communications, vol. 34, no. 3, 2016, pp. 510-527.
-
(2016)
IEEE J. Selected Areas in Communications
, vol.34
, Issue.3
, pp. 510-527
-
-
Palattella, M.R.1
Dohler, M.2
Grieco, A.3
Rizzo, G.4
Torsner, J.5
Engel, T.6
-
2
-
-
84928741396
-
Processing distributed internet of things data in clouds
-
L. Wang and R. Ranjan, "Processing Distributed Internet of Things Data in Clouds," IEEE Cloud Computing, vol. 2, no. 1, 2015, pp. 76-80.
-
(2015)
IEEE Cloud Computing
, vol.2
, Issue.1
, pp. 76-80
-
-
Wang, L.1
Ranjan, R.2
-
3
-
-
84928725904
-
Edge analytics in the internet of things
-
M. Satyanarayanan, P. Simoens, Y. Xiao, P. Pillai, Z. Chen, K. Ha, et al., "Edge Analytics in the Internet of Things," IEEE Pervasive Computing, vol. 14, 2015, pp. 24-31.
-
(2015)
IEEE Pervasive Computing
, vol.14
, pp. 24-31
-
-
Satyanarayanan, M.1
Simoens, P.2
Xiao, Y.3
Pillai, P.4
Chen, Z.5
Ha, K.6
-
4
-
-
84969509112
-
Fog computing: Platform and applications
-
S. Yi, Z. Hao, Z. Qin, and Q. Li, "Fog Computing: Platform and Applications," 2015 3rd IEEE Workshop Hot Topics Web Systems and Technologies (HotWeb), 2015, pp. 73-78.
-
(2015)
2015 3rd IEEE Workshop Hot Topics Web Systems and Technologies (HotWeb
, pp. 73-78
-
-
Yi, S.1
Hao, Z.2
Qin, Z.3
Li, Q.4
-
5
-
-
84969847954
-
Twenty security considerations for cloud-supported internet of Things
-
J. Singh, T. Pasquier, J. Bacon, H. Ko, and D. Eyers, "Twenty Security Considerations for Cloud-Supported Internet of Things," IEEE Internet of Things J., vol. 3, no. 3, 2016, pp. 269-284.
-
(2016)
IEEE Internet of Things J
, vol.3
, Issue.3
, pp. 269-284
-
-
Singh, J.1
Pasquier, T.2
Bacon, J.3
Ko, H.4
Eyers, D.5
-
6
-
-
84958202773
-
SeDaSC: Secure data sharing in clouds
-
M. Ali, R. Dhamotharan, E. Khan, S. U. Khan, A.V. Vasilakos, K. Li, et al., "SeDaSC: Secure Data Sharing in Clouds," IEEE Systems J., vol. 99, 2015, pp. 1-10.
-
(2015)
IEEE Systems J
, vol.99
, pp. 1-10
-
-
Ali, M.1
Dhamotharan, R.2
Khan, E.3
Khan, S.U.4
Vasilakos, A.V.5
Li, K.6
-
7
-
-
84959540048
-
An efficient certificateless encryption for secure data sharing in Public Clouds
-
S.-H. Seo, M. Nabeel, X. Ding, and E. Bertino, "An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds," IEEE Trans. Knowledge and Data Engineering, vol. 26, no. 9, 2014, pp. 2107-2119.
-
(2014)
IEEE Trans. Knowledge and Data Engineering
, vol.26
, Issue.9
, pp. 2107-2119
-
-
Seo, S.-H.1
Nabeel, M.2
Ding, X.3
Bertino, E.4
-
8
-
-
84973885505
-
Secure data analytics for cloud-integrated internet of things Applications
-
H. Kumarage, I. Khalil, A. Alabdulatif, Z. Tari, and X. Yi, "Secure Data Analytics for Cloud-Integrated Internet of Things Applications," IEEE Cloud Computing, vol. 3, no. 2, 2016, pp. 46-56.
-
(2016)
IEEE Cloud Computing
, vol.3
, Issue.2
, pp. 46-56
-
-
Kumarage, H.1
Khalil, I.2
Alabdulatif, A.3
Tari, Z.4
Yi, X.5
-
9
-
-
84929447941
-
TACIoT: Multidimensional trust-Aware access control system for the internet of things
-
J.B. Bernabe, J.L.H. Ramos, and A.F.S. Gomez, "TACIoT: Multidimensional Trust-Aware Access Control System for the Internet of Things," Soft Computing, vol. 20, no. 5, 2016, pp. 1763-1779.
-
(2016)
Soft Computing
, vol.20
, Issue.5
, pp. 1763-1779
-
-
Bernabe, J.B.1
Ramos, J.L.H.2
Gomez, A.F.S.3
-
10
-
-
84941881096
-
Robust access control framework for mobile cloud computing Network
-
F. Li, Y. Rahulamathavan, M. Conti, and M. Rajarajan, "Robust Access Control Framework for Mobile Cloud Computing Network," Computer Communications, vol. 68, 2015, pp. 61-72.
-
(2015)
Computer Communications
, vol.68
, pp. 61-72
-
-
Li, F.1
Rahulamathavan, Y.2
Conti, M.3
Rajarajan, M.4
-
11
-
-
84924804821
-
Enabling efficient multi-keyword ranked search over encrypted Mobile Cloud Data Through Blind Storage
-
H. Li, D. Liu, Y. Dai, T.H. Luan, and X. Shen, "Enabling Efficient Multi-Keyword Ranked Search over Encrypted Mobile Cloud Data Through Blind Storage," IEEE Trans. Emerging Topics in Computing, vol. 3, no. 1, 2015, pp. 127-138.
-
(2015)
IEEE Trans. Emerging Topics in Computing
, vol.3
, Issue.1
, pp. 127-138
-
-
Li, H.1
Liu, D.2
Dai, Y.3
Luan, T.H.4
Shen, X.5
-
12
-
-
84940510005
-
Engineering searchable encryption of mobile cloud networks: When QoE Meets Qop
-
H. Li, D. Liu, Y. Dai, and T.H. Luan, "Engineering Searchable Encryption of Mobile Cloud Networks: When Qoe Meets Qop," IEEE Wireless Communications, vol. 22, no. 4, 2015, pp. 74-80.
-
(2015)
IEEE Wireless Communications
, vol.22
, Issue.4
, pp. 74-80
-
-
Li, H.1
Liu, D.2
Dai, Y.3
Luan, T.H.4
-
13
-
-
84872004857
-
CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud
-
L. Xu, X. Wu, and X. Zhang, :CL-PRE: A Certificateless Proxy Re-Encryption Scheme For Secure Data Sharing with Public Cloud," Proc. 7th ACM Symposium on Information, Computer and Communications Security, 2012, pp. 87-88.
-
(2012)
Proc. 7th ACM Symposium on Information, Computer and Communications Security
, pp. 87-88
-
-
Xu, L.1
Wu, X.2
Zhang, X.3
-
14
-
-
84901987724
-
Incremental proxy re-encryption scheme for mobile cloud Computing Environment
-
A.N. Khan, M.M. Kiah, S.A. Madani, M. Ali, and S. Shamshirband, "Incremental Proxy Re-Encryption Scheme for Mobile Cloud Computing Environment," J. Supercomputing, vol. 68, no. 2, 2014, pp. 624-651.
-
(2014)
J. Supercomputing
, vol.68
, Issue.2
, pp. 624-651
-
-
Khan, A.N.1
Kiah, M.M.2
Madani, S.A.3
Ali, M.4
Shamshirband, S.5
-
15
-
-
84960865942
-
An efficient and secure privacy-preserving approach for outsourced Data of Resource Constrained Mobile Devices in Cloud Computing
-
S.K. Pasupuleti, S. Ramalingam, and R. Buyya, "An Efficient and Secure Privacy-Preserving Approach for Outsourced Data of Resource Constrained Mobile Devices in Cloud Computing," J. Network and Computer Applications, vol. 64, 2016, pp. 12-22.
-
(2016)
J. Network and Computer Applications
, vol.64
, pp. 12-22
-
-
Pasupuleti, S.K.1
Ramalingam, S.2
Buyya, R.3
|