Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2893918
Abstract: The Internet of Things (IoT) is an enormous ubiquitous-network, which connects the objects through various sensors. The IoT technology promotes the interconnection and fusion between the physical world and information space, and it facilitates the…
read more here.
Keywords:
unlinkable authentication;
scheme;
authentication;
security ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Systems Journal"
DOI: 10.1109/jsyst.2016.2574719
Abstract: Recently, Tsai and Lo proposed a privacy aware authentication scheme for distributed mobile cloud computing services. It is claimed that the scheme achieves mutual authentication and withstands all major security threats. However, we first identify…
read more here.
Keywords:
privacy aware;
authentication scheme;
scheme distributed;
aware authentication ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2018.2858792
Abstract: With the wide adoption of large-scale internet services and big data, the cloud has become the ideal environment to satisfy the ever-growing storage demand. In this context, data replication has been touted as the ultimate…
read more here.
Keywords:
efficient replica;
migration scheme;
migration;
replica migration ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Symmetry"
DOI: 10.3390/sym15020423
Abstract: Recently, decentralized file systems are widely used to overcome centralized file systems’ load asymmetry between nodes and the scalability problem. Due to the lack of a metadata server, decentralized systems require more RPC requests to…
read more here.
Keywords:
file systems;
merging scheme;
scheme distributed;
scheme ... See more keywords