Articles with "scheme distributed" as a keyword



Photo by lensingmyworld from unsplash

An Unlinkable Authentication Scheme for Distributed IoT Application

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2893918

Abstract: The Internet of Things (IoT) is an enormous ubiquitous-network, which connects the objects through various sensors. The IoT technology promotes the interconnection and fusion between the physical world and information space, and it facilitates the… read more here.

Keywords: unlinkable authentication; scheme; authentication; security ... See more keywords
Photo from wikipedia

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Systems Journal"

DOI: 10.1109/jsyst.2016.2574719

Abstract: Recently, Tsai and Lo proposed a privacy aware authentication scheme for distributed mobile cloud computing services. It is claimed that the scheme achieves mutual authentication and withstands all major security threats. However, we first identify… read more here.

Keywords: privacy aware; authentication scheme; scheme distributed; aware authentication ... See more keywords

Efficient Replica Migration Scheme for Distributed Cloud Storage Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2018.2858792

Abstract: With the wide adoption of large-scale internet services and big data, the cloud has become the ideal environment to satisfy the ever-growing storage demand. In this context, data replication has been touted as the ultimate… read more here.

Keywords: efficient replica; migration scheme; migration; replica migration ... See more keywords
Photo by arthurbizkit from unsplash

Efficient I/O Merging Scheme for Distributed File Systems

Sign Up to like & get
recommendations!
Published in 2023 at "Symmetry"

DOI: 10.3390/sym15020423

Abstract: Recently, decentralized file systems are widely used to overcome centralized file systems’ load asymmetry between nodes and the scalability problem. Due to the lack of a metadata server, decentralized systems require more RPC requests to… read more here.

Keywords: file systems; merging scheme; scheme distributed; scheme ... See more keywords