Articles with "computing environments" as a keyword



Photo by szolkin from unsplash

Practical deniable authentication for pervasive computing environments

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Networks"

DOI: 10.1007/s11276-016-1317-9

Abstract: AbstractPervasive computing environments allow users to get services anytime and anywhere. Security has become a great challenge in pervasive computing environments because of its heterogeneity, openness, mobility and dynamicity. In this paper, we propose two… read more here.

Keywords: computing environments; pervasive computing; practical deniable; deniable authentication ... See more keywords
Photo by joakimnadell from unsplash

HIDRA: A Distributed Blockchain-Based Architecture for Fog/Edge Computing Environments

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3082197

Abstract: Nowadays, the fog computing paradigm is being consolidated as a solution for processing the explosion of data generated by lots of common IoT devices connected to the Internet. In contrast to cloud computing, fog computing… read more here.

Keywords: computing environments; fog computing; architecture; blockchain ... See more keywords
Photo by acfb5071 from unsplash

Lightweight Power Monitoring Framework for Virtualized Computing Environments

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2019.2936018

Abstract: The pervasive use of virtualization techniques in today's datacenters poses challenges in power monitoring since it is not possible to directly measure the power consumption of a virtual entity such as a virtual machine (VM)… read more here.

Keywords: computing environments; power; virtualized computing; power monitoring ... See more keywords