-
1
-
-
80052698972
-
Distributed road surface condition monitoring using mobile phones
-
M. Perttunen, O. Mazhelis, F. Cong et al., "Distributed road surface condition monitoring using mobile phones," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 6905, pp. 64-78, 2011.
-
(2011)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
, vol.6905
, pp. 64-78
-
-
Perttunen, M.1
Mazhelis, O.2
Cong, F.3
-
2
-
-
80052382905
-
A recursive multiscale correlation-averaging algorithm for an automated distributed road-condition-monitoring system
-
M. Ndoye, A. M. Barker, J. V. Krogmeier, and D. M. Bullock, "A recursive multiscale correlation-averaging algorithm for an automated distributed road-condition-monitoring system," IEEE Transactions on Intelligent Transportation Systems, vol. 12, no. 3, pp. 795-808, 2011.
-
(2011)
IEEE Transactions on Intelligent Transportation Systems
, vol.12
, Issue.3
, pp. 795-808
-
-
Ndoye, M.1
Barker, A.M.2
Krogmeier, J.V.3
Bullock, D.M.4
-
3
-
-
84876761018
-
Energy-spectrum efficiency tradeoff for video streaming over mobile ad hoc networks
-
L. Zhou, R. Q. Hu, Y. Qian, andH.-H. Chen, "Energy-spectrum efficiency tradeoff for video streaming over mobile ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 5, pp. 981-991, 2013.
-
(2013)
IEEE Journal on Selected Areas in Communications
, vol.31
, Issue.5
, pp. 981-991
-
-
Zhou, L.1
Hu, R.Q.2
Qian, Y.3
Chen, H.-H.4
-
4
-
-
85050872676
-
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems
-
Q. Jiang, Z. Chen, B. Li, J. Shen, L. Yang, and J. Ma, "Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems," Journal of Ambient Intelligence and Humanized Computing, 2017.
-
(2017)
Journal of Ambient Intelligence and Humanized Computing
-
-
Jiang, Q.1
Chen, Z.2
Li, B.3
Shen, J.4
Yang, L.5
Ma, J.6
-
5
-
-
85015762814
-
Optimal content prefetching in NDN vehicle-to-infrastructure scenario
-
G.Mauri,M. Gerla, F. Bruno,M. Cesana, andG. Verticale, "Optimal Content Prefetching in NDN Vehicle-to-Infrastructure Scenario," IEEE Transactions on Vehicular Technology, vol. 66, no. 3, pp. 2513-2525, 2017.
-
(2017)
IEEE Transactions on Vehicular Technology
, vol.66
, Issue.3
, pp. 2513-2525
-
-
Mauri, G.1
Gerla, M.2
Bruno, F.3
Cesana, M.4
Verticale, G.5
-
6
-
-
84925262438
-
VANET-cloud: A generic cloud computing model for vehicular Ad Hoc networks
-
S. Bitam, A.Mellouk, andS. Zeadally, "VANET-cloud: A generic cloud computing model for vehicular Ad Hoc networks," IEEE Wireless Communications Magazine, vol. 22, no. 1, pp. 96-102, 2015.
-
(2015)
IEEE Wireless Communications Magazine
, vol.22
, Issue.1
, pp. 96-102
-
-
Bitam, S.1
Mellouk, A.2
Zeadally, S.3
-
7
-
-
85012065387
-
An efficient multiple session key establishment scheme for VANET group integration
-
C.-C. Lee, Y.-M. Lai, and P.-J. Cheng, "An efficient multiple session key establishment scheme for VANET group integration," IEEE Intelligent Systems, vol. 31, no. 6, pp. 35-43, 2016.
-
(2016)
IEEE Intelligent Systems
, vol.31
, Issue.6
, pp. 35-43
-
-
Lee, C.-C.1
Lai, Y.-M.2
Cheng, P.-J.3
-
8
-
-
84961572683
-
A secure cloud-assisted wireless body area network in mobile emergency medical care system
-
C.-T. Li, C.-C. Lee, and C.-Y. Weng, "A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System," Journal of Medical Systems, vol. 40, no. 5, article no. 117, 2016.
-
(2016)
Journal of Medical Systems
, vol.40
, Issue.5
-
-
Li, C.-T.1
Lee, C.-C.2
Weng, C.-Y.3
-
9
-
-
84866627419
-
Fog computing and its role in the internet of things
-
Finland, August
-
F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing and its role in the internet of things," in Proceedings of the 1st ACMMobile Cloud ComputingWorkshop,MCC 2012, pp. 13-15, Finland, August 2012.
-
(2012)
Proceedings of the 1st ACMMobile Cloud ComputingWorkshop,MCC 2012
, pp. 13-15
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
10
-
-
84951050684
-
A survey of fog computing: Concepts, applications and issues
-
ACM, Hangzhou, China, June
-
S. Yi, C. Li, and Q. Li, "A survey of fog computing: concepts, applications and issues," in Proceedings of the Workshop on Mobile Big Data (Mobidata '15), pp. 37-42, ACM, Hangzhou, China, June 2015.
-
(2015)
Proceedings of the Workshop on Mobile Big Data (Mobidata '15)
, pp. 37-42
-
-
Yi, S.1
Li, C.2
Li, Q.3
-
11
-
-
85026636505
-
From cloud to fog computing: A review and a conceptual live VM migration framework
-
O. Osanaiye, S. Chen, Z. Yan, R. Lu, K.-K. R. Choo, and M. Dlodlo, "From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework," IEEE Access, vol. 5, pp. 8284-8300, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 8284-8300
-
-
Osanaiye, O.1
Chen, S.2
Yan, Z.3
Lu, R.4
Choo, K.-K.R.5
Dlodlo, M.6
-
12
-
-
84923117513
-
Fog computing: A cloud to the ground support for smart things and machine-to-machine networks
-
Australia, November
-
I. Stojmenovic, "Fog computing: A cloud to the ground support for smart things and machine-to-machine networks," in Proceedings of the 2014 Australasian Telecommunication Networks and Applications Conference, ATNAC 2014, pp. 117-122, Australia, November 2014.
-
(2014)
Proceedings of the 2014 Australasian Telecommunication Networks and Applications Conference, ATNAC 2014
, pp. 117-122
-
-
Stojmenovic, I.1
-
13
-
-
79951814345
-
An efficient authentication protocol for mobile communications
-
C.-C. Lee, I.-E. Liao, and M.-S.Hwang, "An efficient authentication protocol for mobile communications," Telecommunication Systems, vol. 46, no. 1, pp. 31-41, 2011.
-
(2011)
Telecommunication Systems
, vol.46
, Issue.1
, pp. 31-41
-
-
Lee, C.-C.1
Liao, I.-E.2
Hwang, M.-S.3
-
14
-
-
85013439269
-
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity
-
X. Li, J. Peng, S. Kumari, F. Wu, M. Karuppiah, and K. Raymond Choo, "An enhanced 1-round authentication protocol for wireless body area networks with user anonymity," Computers & Electrical Engineering, 2017.
-
(2017)
Computers & Electrical Engineering
-
-
Li, X.1
Peng, J.2
Kumari, S.3
Wu, F.4
Karuppiah, M.5
Raymond Choo, K.6
-
15
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) 〈 cost(signature) + cost(encryption)
-
Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption) 〈 cost(signature) + cost(encryption)," in Advances in Cryptology.CRYPTO '97. Proceedings 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17.21, 1997, vol. 1294 of Lecture Notes in Computer Science, pp. 165-179, 1997.
-
(1997)
Advances in Cryptology.CRYPTO '97. Proceedings 17th Annual International Cryptology Conference Santa Barbara, California, USA August 17.21, 1997, vol.1294 of Lecture Notes in Computer Science
, pp. 165-179
-
-
Zheng, Y.1
-
16
-
-
62449111027
-
Certificateless signcryption
-
ACM, March
-
M. Barbosa and P. Farshim, "Certificateless signcryption," in Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS '08), pp. 369-372, ACM, March 2008.
-
(2008)
Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS '08)
, pp. 369-372
-
-
Barbosa, M.1
Farshim, P.2
-
17
-
-
77649265562
-
Identity based aggregate signcryption schemes
-
S. S. D. Selvi, S. S. Vivek, J. Shriram, S. Kalaivani, and C. P. Rangan, "Identity based aggregate signcryption schemes," Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 5922, pp. 378-397, 2009.
-
(2009)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, Vol
, vol.5922
, pp. 378-397
-
-
Selvi, S.S.D.1
Vivek, S.S.2
Shriram, J.3
Kalaivani, S.4
Rangan, C.P.5
-
18
-
-
70349557354
-
Hierarchical ID-based cryptography
-
Springer, Berlin
-
C. Gentry and A. Silverberg, "Hierarchical ID-based cryptography," in Advances in cryptology.ASIACRYPT 2002, vol. 2501 of Lecture Notes in Comput. Sci., pp. 548-566, Springer, Berlin, 2002.
-
(2002)
Advances in Cryptology.ASIACRYPT 2002 Vol. 2501 of Lecture Notes in Comput. Sci
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
20
-
-
85021672640
-
A privacypreserving vehicular crowdsensing based road surface condition monitoring system using fog computing
-
S. Basudan, X. Lin, and K. Sankaranarayanan, "A privacypreserving vehicular crowdsensing based road surface condition monitoring system using fog computing," IEEE Internet of Things Journal, no. 99, pp. 1-1, 2017.
-
(2017)
IEEE Internet of Things Journal
, Issue.99
, pp. 1
-
-
Basudan, S.1
Lin, X.2
Sankaranarayanan, K.3
-
21
-
-
84930216224
-
Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks
-
H. Xiong and Z. Qin, "Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks," IEEE Transactions on Information Forensics and Security, vol. 10, no. 7, pp. 1442-1455, 2015.
-
(2015)
IEEE Transactions on Information Forensics and Security
, vol.10
, Issue.7
, pp. 1442-1455
-
-
Xiong, H.1
Qin, Z.2
-
22
-
-
85006189359
-
Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
-
Z. Eslami and N. Pakniat, "Certificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model," Journal of King Saud University-Computer and Information Sciences, vol. 26, no. 3, pp. 276-286, 2014.
-
(2014)
Journal of King Saud University-Computer and Information Sciences
, vol.26
, Issue.3
, pp. 276-286
-
-
Eslami, Z.1
Pakniat, N.2
-
23
-
-
85018460561
-
Lightweight threefactor authentication and key agreement protocol for internetintegrated wireless sensor networks
-
Q. Jiang, S. Zeadally, J. Ma, and D. He, "Lightweight threefactor authentication and key agreement protocol for internetintegrated wireless sensor networks," IEEE Access, vol. 5, pp. 3376-3392, 2017.
-
(2017)
IEEE Access
, vol.5
, pp. 3376-3392
-
-
Jiang, Q.1
Zeadally, S.2
Ma, J.3
He, D.4
-
24
-
-
84986267432
-
Advanced secure anonymous authentication scheme for roaming service in globalmobility networks
-
C.-C. Lee, Y.-M. Lai, C.-T. Chen, and S.-D. Chen, "Advanced Secure Anonymous Authentication Scheme for Roaming Service in GlobalMobility Networks,"Wireless Personal Communications, vol. 94, no. 3, pp. 1281-1296, 2017.
-
(2017)
Wireless Personal Communications
, vol.94
, Issue.3
, pp. 1281-1296
-
-
Lee, C.-C.1
Lai, Y.-M.2
Chen, C.-T.3
Chen, S.-D.4
-
25
-
-
85021731374
-
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city
-
X. Li, A. K. Sangaiah, S. Kumari, F. Wu, J. Shen, and M. K. Khan, "An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city," Personal and Ubiquitous Computing, vol. 21, no. 5, pp. 791-805, 2017.
-
(2017)
Personal and Ubiquitous Computing
, vol.21
, Issue.5
, pp. 791-805
-
-
Li, X.1
Sangaiah, A.K.2
Kumari, S.3
Wu, F.4
Shen, J.5
Khan, M.K.6
-
26
-
-
84938203681
-
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
-
D. Wang, N. Wang, P. Wang, and S. Qing, "Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity," Information Sciences, vol. 321, Article ID 11496, pp. 162-178, 2015.
-
(2015)
Information Sciences
, vol.321
, pp. 162-178
-
-
Wang, D.1
Wang, N.2
Wang, P.3
Qing, S.4
-
27
-
-
84930202100
-
Cost-effective scalable and anonymous certificateless remote authentication protocol
-
H. Xiong, "Cost-effective scalable and anonymous certificateless remote authentication protocol," IEEE Transactions on Information Forensics & Security, vol. 9, no. 12, pp. 2327-2339, 2014.
-
(2014)
IEEE Transactions on Information Forensics & Security
, vol.9
, Issue.12
, pp. 2327-2339
-
-
Xiong, H.1
-
29
-
-
84875455431
-
Improving timing attack on RSA-CRT via error detection and correction strategy
-
C. Chen, T. Wang, and J. Tian, "Improving timing attack on RSA-CRT via error detection and correction strategy," Information Sciences, vol. 232, pp. 464-474, 2013.
-
(2013)
Information Sciences
, vol.232
, pp. 464-474
-
-
Chen, C.1
Wang, T.2
Tian, J.3
|