Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3278995
Abstract: Advancements in Internet of Things devices allow for the collection and analysis of big data. Moreover, cloud computing has emerged as an ideal platform for big data analysis because it quickly provides computing resources for…
read more here.
Keywords:
secure computation;
inline formula;
tex math;
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Intelligent Transportation Systems"
DOI: 10.1109/tits.2020.3014229
Abstract: Vehicular ad hoc networks (VANETs) has become an important part of modern intelligent transportation systems (ITS). However, under the influence of malicious mobile vehicles, offloading vehicle tasks to the cloud server is threatened by security…
read more here.
Keywords:
computation offloading;
blockchain based;
computation;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Wireless Communications"
DOI: 10.1109/twc.2021.3128247
Abstract: In this paper, we consider a mobile edge computing (MEC)-based secure computation offloading system, and design a practical multi-eavesdropper model including two specific scenarios of non-colluding and colluding eavesdropping. Furthermore, we design a requirement satisfaction…
read more here.
Keywords:
satisfaction maximized;
multi eavesdropper;
computation offloading;
maximized secure ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Wireless Communications and Mobile Computing"
DOI: 10.1155/2023/6039034
Abstract: The wireless network suffers from many security problems, and computation in a wireless network environment may fail to preserve privacy as well as correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure…
read more here.
Keywords:
computation;
network;
secure;
series cryptography ... See more keywords