-
1
-
-
85042787741
-
A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks
-
Tang, J.; Liu, A.; Zhang, J.; Xiong, N.N.; Zeng, Z.; Wang, T. A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks. Sensors 2018, 18, 751.
-
(2018)
Sensors
, vol.18
, pp. 751
-
-
Tang, J.1
Liu, A.2
Zhang, J.3
Xiong, N.N.4
Zeng, Z.5
Wang, T.6
-
2
-
-
85042715495
-
A smart high-speed backbone path construction approach for energy and delay optimization in WSNS
-
Liu, A.; Huang, M.; Zhao, M.; Wang, T. A smart high-speed backbone path construction approach for energy and delay optimization in WSNS. IEEE Access 2018.
-
(2018)
IEEE Access
-
-
Liu, A.1
Huang, M.2
Zhao, M.3
Wang, T.4
-
3
-
-
85044437790
-
LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks
-
Li, Y.; Cai, Z.; Xu, H. LLMP: Exploiting LLDP for Latency Measurement in Software-Defined Data Center Networks. J. Comput. Sci. Technol. 2018, 33, 277-285.
-
(2018)
J. Comput. Sci. Technol.
, vol.33
, pp. 277-285
-
-
Li, Y.1
Cai, Z.2
Xu, H.3
-
4
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
Salzburg, Austria, 10-13 April
-
Chun, B.G.; Ihm, S.; Maniatis, P.; Naik, M.; Patti, A. Clonecloud: Elastic execution between mobile device and cloud. In Proceedings of the 6th Conference on Computer systems, Salzburg, Austria, 10-13 April 2011; pp. 301-314.
-
(2011)
Proceedings of the 6th Conference on Computer systems
, pp. 301-314
-
-
Chun, B.G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
6
-
-
78449236807
-
Mobicloud: Building secure cloud framework for mobile computing and communication
-
Nanjing, China, 4-5 June
-
Huang, D.; Zhang, X.; Kang, M.; Luo, J. Mobicloud: Building secure cloud framework for mobile computing and communication. In Proceedings of the IEEE International Symposium on Service Oriented System Engineering, Nanjing, China, 4-5 June 2010; pp. 27-34.
-
(2010)
Proceedings of the IEEE International Symposium on Service Oriented System Engineering
, pp. 27-34
-
-
Huang, D.1
Zhang, X.2
Kang, M.3
Luo, J.4
-
7
-
-
85042125055
-
A clustering k-anonymity privacy-preserving method for wearable IoT devices
-
Liu, F.; Li, T. A clustering k-anonymity privacy-preserving method for wearable IoT devices. Secur. Commun. Netw. 2018.
-
(2018)
Secur. Commun. Netw.
-
-
Liu, F.1
Li, T.2
-
8
-
-
85045520335
-
Security and Privacy in the Medical Internet of Things:A Review
-
Sun, W.; Cai, Z.; Li, Y.; Liu, F.; Fang, S.; Wang, G. Security and Privacy in the Medical Internet of Things:A Review. Secur. Commun. Netw. 2018.
-
(2018)
Secur. Commun. Netw.
-
-
Sun, W.1
Cai, Z.2
Li, Y.3
Liu, F.4
Fang, S.5
Wang, G.6
-
9
-
-
85042701249
-
QTSAC: An energy-efficient mac protocol for delay minimization in wireless sensor networks
-
Liu, Y.; Ota, K.; Zhang, K.; Ma, M.; Xiong, N.; Liu, A.; Long, J. QTSAC: An energy-efficient mac protocol for delay minimization in wireless sensor networks. IEEE Access 2018, 6, 8273-8291.
-
(2018)
IEEE Access
, vol.6
, pp. 8273-8291
-
-
Liu, Y.1
Ota, K.2
Zhang, K.3
Ma, M.4
Xiong, N.5
Liu, A.6
Long, J.7
-
10
-
-
43349086436
-
Zerber: R-confidential indexing for distributed documents
-
Nantes, France, 25-29 March
-
Zerr, S.; Demidova, E.; Olmedilla, D.; Nejdl,W.;Winslett, M.; Mitra, S. Zerber: R-confidential indexing for distributed documents. In Proceedings of the International Conference on Extending Database Technology (EDBT 2008), Nantes, France, 25-29 March 2008; pp. 287-298.
-
(2008)
Proceedings of the International Conference on Extending Database Technology (EDBT 2008)
, pp. 287-298
-
-
Zerr, S.1
Demidova, E.2
Olmedilla, D.3
Nejdl, W.4
Winslett, M.5
Mitra, S.6
-
11
-
-
70349220256
-
Confidentiality-preserving rank-ordered search
-
Alexandria, VA, USA, 29 October
-
Swaminathan, A.; Mao, Y.; Su, G.M.; Gou, H.; Varna, A.L.; He, S.; Wu, M.; Oard, D.W. Confidentiality-preserving rank-ordered search. In Proceedings of the 2007 ACM Workshop on Storage Security and Survivability, Alexandria, VA, USA, 29 October 2007; pp. 7-12.
-
(2007)
Proceedings of the 2007 ACM Workshop on Storage Security and Survivability
, pp. 7-12
-
-
Swaminathan, A.1
Mao, Y.2
Su, G.M.3
Gou, H.4
Varna, A.L.5
He, S.6
Wu, M.7
Oard, D.W.8
-
12
-
-
81255134906
-
Searchable symmetric encryption: Improved definitions and efficient constructions
-
Curtmola, R.; Garay, J.; Kamara, S.; Ostrovsky, R. Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 2011, 19, 895-934.
-
(2011)
J. Comput. Secur.
, vol.19
, pp. 895-934
-
-
Curtmola, R.1
Garay, J.2
Kamara, S.3
Ostrovsky, R.4
-
13
-
-
77952589508
-
Building an encrypted and searchable audit log
-
Waters, B.R.; Balfanz, D.; Durfee, G.; Smetters, D.K. Building an encrypted and searchable audit log. Annu. Netw. Distrib. Syst. Secur. Symp. 2004, 4, 5-6.
-
(2004)
Annu. Netw. Distrib. Syst. Secur. Symp.
, vol.4
, pp. 5-6
-
-
Waters, B.R.1
Balfanz, D.2
Durfee, G.3
Smetters, D.K.4
-
14
-
-
85021847532
-
Tees: An efficient search scheme over encrypted data on mobile cloud
-
Li, J.; Ma, R.; Guan, H. Tees: An efficient search scheme over encrypted data on mobile cloud. IEEE Trans. Cloud Comput. 2017, 5, 126-139.
-
(2017)
IEEE Trans. Cloud Comput.
, vol.5
, pp. 126-139
-
-
Li, J.1
Ma, R.2
Guan, H.3
-
15
-
-
77955905009
-
Secure ranked keyword search over encrypted cloud data
-
Genova, Italy, 21-25 June
-
Wang, C.; Cao, N.; Li, J.; Ren, K.; Lou, W. Secure ranked keyword search over encrypted cloud data. In Proceedings of the IEEE International Conference on Distributed Computing Systems, Genova, Italy, 21-25 June 2010; pp. 253-262.
-
(2010)
Proceedings of the IEEE International Conference on Distributed Computing Systems
, pp. 253-262
-
-
Wang, C.1
Cao, N.2
Li, J.3
Ren, K.4
Lou, W.5
-
16
-
-
70349110963
-
-
Saint-Petersburg, Russia, 23-26 March
-
Zerr, S.; Olmedilla, D.; Nejdl, W.; Siberski, W. Zerber+r: Top-k retrieval from a confidential index. In Proceedings of the International Conference on Extending Database Technology: Advances in Database Technology, Saint-Petersburg, Russia, 23-26 March 2009; pp. 439-449.
-
(2009)
Zerber+r: Top-k retrieval from a confidential index. In Proceedings of the International Conference on Extending Database Technology: Advances in Database Technology
, pp. 439-449
-
-
Zerr, S.1
Olmedilla, D.2
Nejdl, W.3
Siberski, W.4
-
17
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
San Diego, CA, USA, 5-8 February
-
Islam, M.S.; Kuzu, M.; Kantarcioglu, M. Access pattern disclosure on searchable encryption: Ramification, attack and mitigation. In Proceedings of the 19th Annual Network & Distributed System Security Symposium, San Diego, CA, USA, 5-8 February 2012.
-
(2012)
Proceedings of the 19th Annual Network & Distributed System Security Symposium
-
-
Islam, M.S.1
Kuzu, M.2
Kantarcioglu, M.3
-
18
-
-
84873479181
-
A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering
-
Cai, Z.; Wang, Z.; Zheng, K.; Cao, J. A distributed TCAM coprocessor architecture for integrated longest prefix matching, policy filtering, and content filtering. IEEE Trans. Comput. 2013, 62, 417-427.
-
(2013)
IEEE Trans. Comput.
, vol.62
, pp. 417-427
-
-
Cai, Z.1
Wang, Z.2
Zheng, K.3
Cao, J.4
-
19
-
-
85045523370
-
A survey on security-aware network measurement in SDN
-
Zhang, H.; Cai, Z.; Liu, Q.; Xiao, Q.; Li, Y.; Chak, F.C. A survey on security-aware network measurement in SDN. Secur. Commun. Netw. 2018, 2018.
-
(2018)
Secur. Commun. Netw.
, pp. 2018
-
-
Zhang, H.1
Cai, Z.2
Liu, Q.3
Xiao, Q.4
Li, Y.5
Chak, F.C.6
-
20
-
-
85009446769
-
The emergence of edge computing
-
Satyanarayanan, M. The emergence of edge computing. Computer 2017, 50, 30-39.
-
(2017)
Computer
, vol.50
, pp. 30-39
-
-
Satyanarayanan, M.1
-
21
-
-
84987842183
-
Edge computing: Vision and challenges
-
Shi, W.; Cao, J.; Zhang, Q.; Li, Y.; Xu, L. Edge computing: Vision and challenges. IEEE Internet Things J. 2016, 3, 637-646.
-
(2016)
IEEE Internet Things J.
, vol.3
, pp. 637-646
-
-
Shi, W.1
Cao, J.2
Zhang, Q.3
Li, Y.4
Xu, L.5
-
22
-
-
85045506981
-
-
Available online, accessed on 2 January 2018
-
Paradrop. Available online: https://www.paradrop.org/ (accessed on 2 January 2018).
-
-
-
-
23
-
-
80052361485
-
An online migration environment for executing mobile applications on the cloud
-
Seoul, Korea, 30 June-2 July
-
Hung, S.H.; Shih, C.S.; Shieh, J.P.; Lee, C.P.; Huang, Y.H. An online migration environment for executing mobile applications on the cloud. In Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Seoul, Korea, 30 June-2 July 2011; pp. 20-27.
-
(2011)
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
, pp. 20-27
-
-
Hung, S.H.1
Shih, C.S.2
Shieh, J.P.3
Lee, C.P.4
Huang, Y.H.5
-
24
-
-
77954305998
-
Phosphor: A cloud based DRM scheme with sim card
-
Busan, Korea, 6-8 April
-
Zou, P.; Wang, C.; Liu, Z.; Bao, D. Phosphor: A cloud based DRM scheme with sim card. In Proceedings of the 2010 12th International Asia-Pacific Web Conference, Busan, Korea, 6-8 April 2010; pp. 459-463.
-
(2010)
Proceedings of the 2010 12th International Asia-Pacific Web Conference
, pp. 459-463
-
-
Zou, P.1
Wang, C.2
Liu, Z.3
Bao, D.4
-
25
-
-
74049152260
-
you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
Chicago, IL, USA, 9-13 November
-
Ristenpart, T.; Tromer, E.; Shacham, H.; Savage, S. Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 9-13 November 2009; pp. 199-212.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Hey, S.S.4
-
26
-
-
26444507272
-
Privacy preserving keyword searches on remote encrypted data
-
New York, NY, USA, 7-10 June
-
Chang, Y.C.; Mitzenmacher, M. Privacy preserving keyword searches on remote encrypted data. In Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS 2005), New York, NY, USA, 7-10 June 2005; pp. 442-455.
-
(2005)
Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS 2005)
, pp. 442-455
-
-
Chang, Y.C.1
Mitzenmacher, M.2
-
27
-
-
84872244063
-
Energy efficiency of mobile clients in cloud computing
-
Boston, MA, USA, 22-25 June
-
Miettinen, A.P.; Nurminen, J.K. Energy efficiency of mobile clients in cloud computing. In Proceedings of the 2nd Usenix Conference on Hot Topics in Cloud Computing, Boston, MA, USA, 22-25 June 2010; p. 4.
-
(2010)
Proceedings of the 2nd Usenix Conference on Hot Topics in Cloud Computing
, pp. 4
-
-
Miettinen, A.P.1
Nurminen, J.K.2
-
28
-
-
74049144464
-
Hail: A high-availability and integrity layer for cloud storage
-
Chicago, IL, USA, 9-13 November
-
Bowers, K.D.; Juels, A.; Oprea, A. Hail: A high-availability and integrity layer for cloud storage. In Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA, 9-13 November 2009; pp. 187-198.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 187-198
-
-
Bowers, K.D.1
Juels, A.2
Oprea, A.3
-
29
-
-
85009802739
-
Mobile edge computing-A key technology towards 5G
-
Hu, Y.C.; Patel, M.; Sabella, D.; Sprecher, N.; Young, V. Mobile edge computing-A key technology towards 5G. ETSI White Paper 2015, 11, 1-6.
-
(2015)
ETSI White Paper
, vol.11
, pp. 1-6
-
-
Hu, Y.C.1
Patel, M.2
Sabella, D.3
Sprecher, N.4
Young, V.5
-
30
-
-
85028027043
-
Biometric security through visual encryption for fog edge computing
-
Abdul, W.; Ali, Z.; Ghouzali, S.; Alfawaz, B.; Muhammad, G.; Hossain, M.S. Biometric security through visual encryption for fog edge computing. IEEE Access 2017, 5, 5531-5538.
-
(2017)
IEEE Access
, vol.5
, pp. 5531-5538
-
-
Abdul, W.1
Ali, Z.2
Ghouzali, S.3
Alfawaz, B.4
Muhammad, G.5
Hossain, M.S.6
-
31
-
-
85042770389
-
SoC-Based Edge Computing Gateway in the Context of the Internet of Multimedia Things: Experimental Platform
-
Jridi, M.; Chapel, T.; Dorez, V.; Le Bougeant, G.; Le Botlan, A. SoC-Based Edge Computing Gateway in the Context of the Internet of Multimedia Things: Experimental Platform. J. Low Power Electron. Appl. 2018, 8, 1.
-
(2018)
J. Low Power Electron. Appl.
, vol.8
, pp. 1
-
-
Jridi, M.1
Chapel, T.2
Dorez, V.3
Le Bougeant, G.4
Le Botlan, A.5
-
32
-
-
84908610702
-
Data security protocol for cloudlet based architecture
-
Jaipur, India, 9-11 May
-
Jindal, M.; Dave, M. Data security protocol for cloudlet based architecture. In Proceedings of the Recent Advances and Innovations in Engineering, Jaipur, India, 9-11 May 2014; pp. 1-5.
-
(2014)
Proceedings of the Recent Advances and Innovations in Engineering
, pp. 1-5
-
-
Jindal, M.1
Dave, M.2
-
33
-
-
79960590319
-
In Secure data processing framework for mobile cloud computing
-
Shanghai, China, 10-15 April
-
Huang, D.; Zhou, Z.; Xu, L.; Xing, T.; Zhong, Y. In Secure data processing framework for mobile cloud computing. In Proceedings of the Computer Communications Workshops, Shanghai, China, 10-15 April 2011; pp. 614-618.
-
(2011)
Proceedings of the Computer Communications Workshops
, pp. 614-618
-
-
Huang, D.1
Zhou, Z.2
Xu, L.3
Xing, T.4
Zhong, Y.5
-
34
-
-
33747729581
-
Inverted Files for Text Search Engines
-
Zobel, J.; Moffat, A. Inverted Files for Text Search Engines. ACM Comput. Surv. 2006, 38, 6.
-
(2006)
ACM Comput. Surv.
, vol.38
, pp. 6
-
-
Zobel, J.1
Moffat, A.2
-
35
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
Kumar, K.; Lu, Y.H. Cloud computing for mobile users: Can offloading computation save energy?. Computer 2010, 43, 51-56.
-
(2010)
Computer
, vol.43
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.H.2
-
36
-
-
84954113614
-
Leakage-abuse attacks against searchable encryption
-
Denver, CO, USA, 12-16 October
-
Cash, D.; Perry, J.; Perry, J.; Ristenpart, T. Leakage-abuse attacks against searchable encryption. In Proceedings of the ACM Conference on Computer and Communications Security, Denver, CO, USA, 12-16 October 2015; pp. 668-679.
-
(2015)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 668-679
-
-
Cash, D.1
Perry, J.2
Perry, J.3
Ristenpart, T.4
-
37
-
-
84893808472
-
Search pattern leakage in searchable encryption: Attacks and new construction
-
Liu, C.; Zhu, L.; Wang, M.; Tan, Y.A. Search pattern leakage in searchable encryption: Attacks and new construction. Inf. Sci. 2014, 265, 176-188.
-
(2014)
Inf. Sci.
, vol.265
, pp. 176-188
-
-
Liu, C.1
Zhu, L.2
Wang, M.3
Tan, Y.A.4
-
38
-
-
85045528872
-
-
RFCs. Available online, accessed on 8 February 2018
-
Internet Engineering Task Force (IETF). RFCs. Available online: http://www.ietf.org/standards/rfcs/ (accessed on 8 February 2018).
-
-
-
-
39
-
-
84979886229
-
-
Available online, accessed on 10 February 2018
-
Qualcomm. Trepn Power Profiler. Available online: https://developer.qualcomm.com/software/trepnpower-profiler (accessed on 10 February 2018).
-
Trepn Power Profiler
-
-
|