-
2
-
-
84989332751
-
Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network
-
P. Corcoran and S. K. Datta, "Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network, " IEEE Consumer Electronics Magazine, vol. 5, no. 4, pp. 73-74, 2016.
-
(2016)
IEEE Consumer Electronics Magazine
, vol.5
, Issue.4
, pp. 73-74
-
-
Corcoran, P.1
Datta, S.K.2
-
3
-
-
80052504558
-
-
Xerox Palo Alto Research Center-PARC, Tech. Rep. NDN-0001
-
L. Zhang, et al., "Named data networking (NDN) project, " Xerox Palo Alto Research Center-PARC, Tech. Rep. NDN-0001, 2010.
-
(2010)
Named Data Networking (NDN) Project
-
-
Zhang, L.1
-
4
-
-
84997051939
-
NDNe: Enhancing named data networking to support cloudification at the edge
-
M. Amadeo, C. Campolo, A. Molinaro, "NDNe: Enhancing named data networking to support cloudification at the edge, " IEEE Communications Letters, vol. 20, no. 11, 2016.
-
(2016)
IEEE Communications Letters
, vol.20
, Issue.11
-
-
Amadeo, M.1
Campolo, C.2
Molinaro, A.3
-
5
-
-
85030159907
-
Information-centric mobile edge computing for connected vehicle environments: Challenges and research directions
-
D. Grewe, M. Wagner, M. Arumaithurai, I. Psaras, D. Kutscher, "Information-centric mobile edge computing for connected vehicle environments: Challenges and research directions, " in Proceedings of the Workshop on Mobile Edge Communications. ACM, 2017, pp. 7-12.
-
(2017)
Proceedings of the Workshop on Mobile Edge Communications. ACM
, pp. 7-12
-
-
Grewe, D.1
Wagner, M.2
Arumaithurai, M.3
Psaras, I.4
Kutscher, D.5
-
7
-
-
84942303394
-
Information centric networking in the IoT: Experiments with ndn in the wild
-
E. Baccelli, C. Mehlis, O. Hahm, T. C. Schmidt, M. Wählisch, "Information centric networking in the IoT: Experiments with ndn in the wild, " in ACM Int. Conf. on Information-centric Networking, 2014.
-
(2014)
ACM Int. Conf. on Information-centric Networking
-
-
Baccelli, E.1
Mehlis, C.2
Hahm, O.3
Schmidt, T.C.4
Wählisch, M.5
-
8
-
-
84963956032
-
Information-centric networking for the internet of things: Challenges and opportunities
-
M. Amadeo, C. Campolo, J. Quevedo, D. Corujo, A. Molinaro, A. Iera, R. L. Aguiar, A. V. Vasilakos, "Information-centric networking for the internet of things: Challenges and opportunities, " IEEE Network, vol. 30, no. 2, pp. 92-100, 2016.
-
(2016)
IEEE Network
, vol.30
, Issue.2
, pp. 92-100
-
-
Amadeo, M.1
Campolo, C.2
Quevedo, J.3
Corujo, D.4
Molinaro, A.5
Iera, A.6
Aguiar, R.L.7
Vasilakos, A.V.8
-
9
-
-
84933041327
-
On the computation offloading at ad hoc cloudlet: Architecture and service modes
-
M. Chen, et al., "On the computation offloading at ad hoc cloudlet: Architecture and service modes, " IEEE Communications Magazine, vol. 53, no. 6, 2015.
-
(2015)
IEEE Communications Magazine
, vol.53
, Issue.6
-
-
Chen, M.1
-
10
-
-
85008245198
-
Mobile edge computing fog et al.: A survey and analysis of security threats and challenges
-
R. Roman, J. Lopez, M. Mambo, "Mobile edge computing, fog, et al.: A survey and analysis of security threats and challenges, " Future Generation Computer Systems, vol. 78, pp. 680-698, 2018.
-
(2018)
Future Generation Computer Systems
, vol.78
, pp. 680-698
-
-
Roman, R.1
Lopez, J.2
Mambo, M.3
-
11
-
-
84990841451
-
Privacy, discovery, authentication for the internet of things
-
Springer International Publishing
-
D. J. Wu, A. Taly, A. Shankar, D. Boneh, "Privacy, discovery, authentication for the internet of things, " in ESORICS 2016: 21st European Symposium on Research in Computer Security. Springer International Publishing, 2016, pp. 301-319.
-
(2016)
ESORICS 2016: 21st European Symposium on Research in Computer Security
, pp. 301-319
-
-
Wu, D.J.1
Taly, A.2
Shankar, A.3
Boneh, D.4
-
13
-
-
4944256021
-
Sigma: The sign-and-mac approach to authenticated diffie-hellman and its use in the IKE protocols
-
Springer
-
H. Krawczyk, "Sigma: The sign-and-mac approach to authenticated diffie-hellman and its use in the IKE protocols, " in Annual International Cryptology Conference. Springer, 2003.
-
(2003)
Annual International Cryptology Conference.
-
-
Krawczyk, H.1
|