Sign Up to like & get
recommendations!
0
Published in 2017 at "Cluster Computing"
DOI: 10.1007/s10586-017-0809-4
Abstract: Cloud computing is one of the great tasks in the business world nowadays, which provides shared processing resources. In cloud area network, security is the main challenge faced by cloud providers and their customers. The…
read more here.
Keywords:
efficient online;
probabilistic homomorphic;
security;
encryption ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2816919
Abstract: Cloud computing is a promising information technique (IT) that can organize a large amount of IT resources in an efficient and flexible manner. Increasingly numerous companies plan to move their local data management systems to…
read more here.
Keywords:
information;
cloud computing;
cloud;
secure efficient ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2908456
Abstract: Cancelable biometric schemes have been widely studied to protect templates in biometric authentication over networks. These schemes transform biometric features and perform pattern matching without restoring the original features. Although they strongly prevent the leakage…
read more here.
Keywords:
secure efficient;
biometric identification;
indexing scheme;
permutation based ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2902907
Abstract: Space information network (SIN) makes it possible for any object to be connected to the Internet anywhere, even in the areas with extreme conditions, where a cellular network is not easy to deploy. Access authentication…
read more here.
Keywords:
secure efficient;
handover;
access;
sin ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2019.2932775
Abstract: Uncertain data pervades many fields, including environmental monitoring, the monitoring of animal migrations, and urban warfare. Such uncertain data collected by field devices, such as Internet of Things (IoT) and Internet of Battlefield Things (IoBT)…
read more here.
Keywords:
secure efficient;
cloud;
query;
uncertain data ... See more keywords
Photo by sotti from unsplash
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2020.2988733
Abstract: Due to the abundant marine resources, smart ocean has attracted much attention of the government, industry, and academy. The Internet-of-Things (IoT) architectures for smart ocean have been proposed to collect various of data from the…
read more here.
Keywords:
iot smart;
smart ocean;
secure efficient;
data collection ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3081456
Abstract: Research on Mobile Cyber Physical Systems (MCPS) that have the superiorities of Cyber Physical Systems (CPS) and expand their application range has become a trend in recent years. The applications of MCPS in fields such…
read more here.
Keywords:
physical systems;
secure efficient;
cyber physical;
mobile cyber ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3088296
Abstract: The outsourcing of data is becoming increasingly commonplace as data is constantly been synchronized between user systems (e.g., personal computers and sensor devices) and cloud computing servers. However, to ensure data privacy, it is necessary…
read more here.
Keywords:
efficient range;
secure efficient;
uncertain data;
scheme ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Cloud Computing"
DOI: 10.1109/tcc.2021.3081702
Abstract: Data deduplication can efficiently eliminate data redundancies in cloud storage and reduce the bandwidth requirement of users. However, most previous schemes depending on the help of a trusted key server (KS) are vulnerable and limited…
read more here.
Keywords:
efficient data;
jointcloud storage;
data deduplication;
secure efficient ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3093711
Abstract: Federated learning facilitates the collaborative training of a global model among distributed clients without sharing their training data. Secure aggregation, a new security primitive for federated learning, aims to preserve the confidentiality of both local…
read more here.
Keywords:
aggregation;
federated learning;
secure efficient;
byzantine ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2022.3186999
Abstract: Biometric applications makes biometric authentication replace the traditional password in many cases. Biometric recognition technology has the advantages of convenience and high stability, facilitating identity recognition. However, the shortcoming of biometric authentication is easy to…
read more here.
Keywords:
authentication;
authentication scheme;
biometric authentication;
secure efficient ... See more keywords