메뉴 건너뛰기




Volumn 2018-January, Issue , 2018, Pages 80-85

Securing the mobile edge through named data networking

Author keywords

Information Centric Networking; Internet of Things Security; Mobile Edge Computing; Named Data Networking

Indexed keywords

EDGE COMPUTING;

EID: 85050374745     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WF-IoT.2018.8355230     Document Type: Conference Paper
Times cited : (21)

References (13)
  • 2
    • 84989332751 scopus 로고    scopus 로고
    • Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network
    • P. Corcoran and S. K. Datta, "Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network, " IEEE Consumer Electronics Magazine, vol. 5, no. 4, pp. 73-74, 2016.
    • (2016) IEEE Consumer Electronics Magazine , vol.5 , Issue.4 , pp. 73-74
    • Corcoran, P.1    Datta, S.K.2
  • 3
    • 80052504558 scopus 로고    scopus 로고
    • Xerox Palo Alto Research Center-PARC, Tech. Rep. NDN-0001
    • L. Zhang, et al., "Named data networking (NDN) project, " Xerox Palo Alto Research Center-PARC, Tech. Rep. NDN-0001, 2010.
    • (2010) Named Data Networking (NDN) Project
    • Zhang, L.1
  • 4
    • 84997051939 scopus 로고    scopus 로고
    • NDNe: Enhancing named data networking to support cloudification at the edge
    • M. Amadeo, C. Campolo, A. Molinaro, "NDNe: Enhancing named data networking to support cloudification at the edge, " IEEE Communications Letters, vol. 20, no. 11, 2016.
    • (2016) IEEE Communications Letters , vol.20 , Issue.11
    • Amadeo, M.1    Campolo, C.2    Molinaro, A.3
  • 9
    • 84933041327 scopus 로고    scopus 로고
    • On the computation offloading at ad hoc cloudlet: Architecture and service modes
    • M. Chen, et al., "On the computation offloading at ad hoc cloudlet: Architecture and service modes, " IEEE Communications Magazine, vol. 53, no. 6, 2015.
    • (2015) IEEE Communications Magazine , vol.53 , Issue.6
    • Chen, M.1
  • 10
    • 85008245198 scopus 로고    scopus 로고
    • Mobile edge computing fog et al.: A survey and analysis of security threats and challenges
    • R. Roman, J. Lopez, M. Mambo, "Mobile edge computing, fog, et al.: A survey and analysis of security threats and challenges, " Future Generation Computer Systems, vol. 78, pp. 680-698, 2018.
    • (2018) Future Generation Computer Systems , vol.78 , pp. 680-698
    • Roman, R.1    Lopez, J.2    Mambo, M.3
  • 13
    • 4944256021 scopus 로고    scopus 로고
    • Sigma: The sign-and-mac approach to authenticated diffie-hellman and its use in the IKE protocols
    • Springer
    • H. Krawczyk, "Sigma: The sign-and-mac approach to authenticated diffie-hellman and its use in the IKE protocols, " in Annual International Cryptology Conference. Springer, 2003.
    • (2003) Annual International Cryptology Conference.
    • Krawczyk, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.