-
1
-
-
85009802739
-
Mobile edge computing A key technology towards 5G
-
Sep.
-
Y. C. Hu, M. Patel, D. Sabella, N. Sprecher, and V. Young, "Mobile edge computing A key technology towards 5G, " ETSI, Sophia Antipolis, France, ETSI White Paper 11, Sep. 2015.
-
(2015)
ETSI, Sophia Antipolis, France, ETSI White Paper 11
-
-
Hu, Y.C.1
Patel, M.2
Sabella, D.3
Sprecher, N.4
Young, V.5
-
2
-
-
85028090976
-
-
Mar. 28
-
(Mar. 28, 2017). Newsroom Mastercard Selfie Payments. [Online]. Available: http://newsroom. mastercard.com/tag/Selfie-payments/
-
(2017)
Newsroom Mastercard Selfie Payments
-
-
-
3
-
-
85015449606
-
Mobile edge computing potential in making cities smarter
-
Mar.
-
T. Taleb, S. Dutta, A. Ksentini, M. Iqbal, and H. Flinck, "Mobile edge computing potential in making cities smarter, " IEEE Commun. Mag., vol. 55, no. 3, pp. 38-43, Mar. 2017.
-
(2017)
IEEE Commun. Mag.
, vol.55
, Issue.3
, pp. 38-43
-
-
Taleb, T.1
Dutta, S.2
Ksentini, A.3
Iqbal, M.4
Flinck, H.5
-
4
-
-
84866627419
-
Fog computing and its role in the Internet of Things
-
Aug.
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the Internet of Things, " in Proc. 1st Ed. MCC Workshop Mobile Cloud Comput., Aug. 2012, pp. 13-16.
-
(2012)
Proc. 1st Ed. MCC Workshop Mobile Cloud Comput.
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
5
-
-
84983103058
-
Key ingredients in an IoT recipe: Fog computing, cloud computing, and more fog computing
-
Dec.
-
M. Yannuzzi, R. Milito, R. Serral-Gracià, D. Montero, and M. Nemirovsky, "Key ingredients in an IoT recipe: Fog computing, cloud computing, and more fog computing, " in Proc. IEEE 19th Int. Workshop Comput. Aided Modeling Design Commun. Links Netw. (CAMAD), Dec. 2014, pp. 325-329.
-
(2014)
Proc. IEEE 19th Int. Workshop Comput. Aided Modeling Design Commun. Links Netw. (CAMAD)
, pp. 325-329
-
-
Yannuzzi, M.1
Milito, R.2
Serral-Gracià, R.3
Montero, D.4
Nemirovsky, M.5
-
6
-
-
84904465488
-
Bringing the cloud to the edge
-
Apr./May
-
H. Chang, A. Hari, S. Mukherjee, and T. V. Lakshman, "Bringing the cloud to the edge, " in Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS), Apr./May 2014, pp. 346-351.
-
(2014)
Proc. IEEE Conf. Comput. Commun. Workshops (INFOCOM WKSHPS)
, pp. 346-351
-
-
Chang, H.1
Hari, A.2
Mukherjee, S.3
Lakshman, T.V.4
-
7
-
-
49149119622
-
Computing in the clouds
-
Dec.
-
A. Weiss, "Computing in the clouds, " Computing, vol. 11, no. 4, pp. 16-25, Dec. 2007.
-
(2007)
Computing
, vol.11
, Issue.4
, pp. 16-25
-
-
Weiss, A.1
-
9
-
-
79952151483
-
The fog of cloud computing: Fourth Amendment issues raised by the blurring of online and offine content
-
R. B. Wells, "The fog of cloud computing: Fourth Amendment issues raised by the blurring of online and offine content, " Univ. Pennsylvania J. Constitutional Law, vol. 12, no. 1, p. 223, 2009.
-
(2009)
Univ. Pennsylvania J. Constitutional Law
, vol.12
, Issue.1
, pp. 223
-
-
Wells, R.B.1
-
10
-
-
85015198008
-
A framework for iris biometrics protection: A marriage between watermarking and visual cryptography
-
Nov.
-
M. A. M. Abdullah, S. S. Dlay, W. L. Woo, and J. A. Chambers, "A framework for iris biometrics protection: A marriage between watermarking and visual cryptography, " IEEE Access, vol. 4, pp. 10180-10193, Nov. 2016.
-
(2016)
IEEE Access
, vol.4
, pp. 10180-10193
-
-
Abdullah, M.A.M.1
Dlay, S.S.2
Woo, W.L.3
Chambers, J.A.4
-
11
-
-
77955415299
-
WLD: A robust local image descriptor
-
Sep.
-
J. Chen et al., "WLD: A robust local image descriptor, " IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 9, pp. 1705-1720, Sep. 2010.
-
(2010)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.32
, Issue.9
, pp. 1705-1720
-
-
Chen, J.1
-
12
-
-
84887108048
-
Error correcting codes for robust color wavelet watermarking
-
Dec.
-
W. Abdul, P. Carré, and P. Gaborit, "Error correcting codes for robust color wavelet watermarking, " EURASIP J. Inf. Secur., vol. 2013, no. 1, Dec. 2013.
-
(2013)
EURASIP J. Inf. Secur.
, Issue.1
-
-
Abdul, W.1
Carré, P.2
Gaborit, P.3
-
13
-
-
84991619073
-
Hybrid multibiometric template protection using watermarking
-
Sep.
-
O. Nafea, S. Ghouzali, W. Abdul, and E.-U.-H. Qazi, "Hybrid multibiometric template protection using watermarking, " Comput. J., vol. 59, no. 9, pp. 1392-1407, Sep. 2016.
-
(2016)
Comput. J.
, vol.59
, Issue.9
, pp. 1392-1407
-
-
Nafea, O.1
Ghouzali, S.2
Abdul, W.3
Qazi, E.-U.-H.4
-
14
-
-
85012115904
-
Toward end-to-end biomet rics-based security for IoT infrastructure
-
Oct.
-
M. S. Hossain, G. Muhammad, S. M. M. Rahman, W. Abdul, A. Alelaiwi, and A. Alamri, "Toward end-to-end biomet rics-based security for IoT infrastructure, " IEEE Wireless Commun., vol. 23, no. 5, pp. 44-51, Oct. 2016.
-
(2016)
IEEE Wireless Commun.
, vol.23
, Issue.5
, pp. 44-51
-
-
Hossain, M.S.1
Muhammad, G.2
Rahman, S.M.M.3
Abdul, W.4
Alelaiwi, A.5
Alamri, A.6
-
15
-
-
84961055627
-
Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique
-
G. Badshah, S.-C. Liew, J. M. Zain, and M. Ali, "Watermark compression in medical image watermarking using Lempel-Ziv-Welch (LZW) lossless compression technique, " J. Digit. Imag., vol. 29, no. 2, pp. 216-225, 2016.
-
(2016)
J. Digit. Imag.
, vol.29
, Issue.2
, pp. 216-225
-
-
Badshah, G.1
Liew, S.-C.2
Zain, J.M.3
Ali, M.4
-
16
-
-
84977743996
-
Cloud-assisted industrial Internet of Things (IIoT) Enabled framework for health monitoring
-
Jun.
-
M. S. Hossain and G. Muhammad, "Cloud-assisted industrial Internet of Things (IIoT) Enabled framework for health monitoring, " Comput. Netw., vol. 101, pp. 192-202, Jun. 2016.
-
(2016)
Comput. Netw.
, vol.101
, pp. 192-202
-
-
Hossain, M.S.1
Muhammad, G.2
-
17
-
-
2142812371
-
Robust real-time face detection
-
May
-
P. Viola and M. J. Jones, "Robust real-time face detection, " Int. J. Comput. Vis., vol. 57, no. 2, pp. 137-154, May 2004.
-
(2004)
Int. J. Comput. Vis.
, vol.57
, Issue.2
, pp. 137-154
-
-
Viola, P.1
Jones, M.J.2
-
19
-
-
84947770950
-
Adaptive halftoned visual cryptography with improved quality and security
-
Jan.
-
S. Sridhar, R. Sathishkumar, and G. F. Sudha, "Adaptive halftoned visual cryptography with improved quality and security, " Multimedia Tools Appl., vol. 76, no. 1, pp. 815-834, Jan. 2017.
-
(2017)
Multimedia Tools Appl.
, vol.76
, Issue.1
, pp. 815-834
-
-
Sridhar, S.1
Sathishkumar, R.2
Sudha, G.F.3
-
20
-
-
85017112168
-
Multiple schemes for mobile payment authentication using QR code and visual cryptography
-
Mar.
-
J. Lu, Z. Yang, L. Li, W. Yuan, L. Li, and C.-C. Chang, "Multiple schemes for mobile payment authentication using QR code and visual cryptography, " Mobile Inf. Syst., vol. 2017, Mar. 2017, Art. no. 4356038.
-
(2017)
Mobile Inf. Syst.
, vol.2017
, pp. 4356038
-
-
Lu, J.1
Yang, Z.2
Li, L.3
Yuan, W.4
Li, L.5
Chang, C.-C.6
-
21
-
-
85000444118
-
New privilege-based visual cryptography with arbitrary privilege levels
-
Jan.
-
C.-N. Yang, J.-K. Liao, and D.-S. Wang, "New privilege-based visual cryptography with arbitrary privilege levels, " J. Vis. Commun. Image Represent., vol. 42, pp. 121-131, Jan. 2017.
-
(2017)
J. Vis. Commun. Image Represent.
, vol.42
, pp. 121-131
-
-
Yang, C.-N.1
Liao, J.-K.2
Wang, D.-S.3
-
22
-
-
84978198914
-
Exploiting the error correction mechanism in QR codes for secret sharing
-
Y.-W. Chow, W. Susilo, G. Yang, J. G. Phillips, I. Pranata, and A. M. Barmawi, "Exploiting the error correction mechanism in QR codes for secret sharing, " in Proc. Austral. Conf. Inf. Secur. Privacy, 2016, pp. 409-425.
-
(2016)
Proc. Austral. Conf. Inf. Secur. Privacy
, pp. 409-425
-
-
Chow, Y.-W.1
Susilo, W.2
Yang, G.3
Phillips, J.G.4
Pranata, I.5
Barmawi, A.M.6
-
23
-
-
84955634141
-
An image copyright protection scheme by encrypting secret data with the host image
-
Jan.
-
A. Rani and B. Raman, "An image copyright protection scheme by encrypting secret data with the host image, " Multimedia Tools Appl., vol. 75, pp. 1027-1042, Jan. 2016.
-
(2016)
Multimedia Tools Appl.
, vol.75
, pp. 1027-1042
-
-
Rani, A.1
Raman, B.2
-
24
-
-
33750378734
-
Orthogonal Laplacianfaces for face recognition
-
Nov.
-
D. Cai, X. He, J. Han, and H.-J. Zhang, "Orthogonal Laplacianfaces for face recognition, " IEEE Trans. Image Process., vol. 15, no. 11, pp. 3608-3614, Nov. 2006.
-
(2006)
IEEE Trans. Image Process.
, vol.15
, Issue.11
, pp. 3608-3614
-
-
Cai, D.1
He, X.2
Han, J.3
Zhang, H.-J.4
-
25
-
-
84944768847
-
Watermarking based multi-biometric fusion approach
-
May
-
S. Ghouzali, "Watermarking based multi-biometric fusion approach, " in Proc. Int. Conf. Codes, Cryptol., Inf. Secur., May 2015, pp. 342-351.
-
(2015)
Proc. Int. Conf. Codes, Cryptol., Inf. Secur.
, pp. 342-351
-
-
Ghouzali, S.1
-
26
-
-
8644228268
-
Locality preserving projections
-
Dec.
-
X. He and P. Niyogi, "Locality preserving projections, " in Proc. NIPS, vol. 16. Dec. 2003, pp. 1-8.
-
(2003)
Proc. NIPS
, vol.16
, pp. 1-8
-
-
He, X.1
Niyogi, P.2
-
27
-
-
85016077429
-
A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices
-
A. Tewari and B. B. Gupta, "A lightweight mutual authentication protocol based on elliptic curve cryptography for IoT devices, " Int. J. Adv. Intell. Paradigms vol. 9, nos. 2-3, pp. 111-121, 2017.
-
(2017)
Int. J. Adv. Intell. Paradigms
, vol.9
, Issue.2-3
, pp. 111-121
-
-
Tewari, A.1
Gupta, B.B.2
-
28
-
-
84983502970
-
Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags
-
A. Tewari and B. B. Gupta, "Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags, " J. Supercomput., vol. 73, no. 3, pp. 1085-1102, 2017.
-
(2017)
J. Supercomput.
, vol.73
, Issue.3
, pp. 1085-1102
-
-
Tewari, A.1
Gupta, B.B.2
-
29
-
-
1942436689
-
Image quality assessment: From error visibility to structural similarity
-
Apr.
-
Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, "Image quality assessment: From error visibility to structural similarity, " IEEE Trans. Image Process., vol. 13, no. 4, pp. 600-612, Apr. 2004.
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
|