4.7 Article

Secure Data Sequence Query Framework Based on Multiple Fogs

Related references

Note: Only part of the references are listed.
Editorial Material Computer Science, Hardware & Architecture

Fog Computing Security Challenges and Future Directions

Deepak Puthal et al.

IEEE CONSUMER ELECTRONICS MAGAZINE (2019)

Article Automation & Control Systems

Fog Computing Based Face Identification and Resolution Scheme in Internet of Things

Pengfei Hu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)

Article Engineering, Electrical & Electronic

MOBILE-EDGE COMPUTING FOR VEHICULAR NETWORKS A Promising Network Paradigm with Predictive Off-Loading

Ke Zhang et al.

IEEE VEHICULAR TECHNOLOGY MAGAZINE (2017)

Article Computer Science, Information Systems

An Attribute-Based Encryption Scheme to Secure Fog Communications

Arwa Alrawais et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

Shuo Wang et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework

Opeyemi Osanaiye et al.

IEEE ACCESS (2017)

Article Computer Science, Information Systems

Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

Pengfei Hu et al.

IEEE INTERNET OF THINGS JOURNAL (2017)

Review Computer Science, Information Systems

Fog computing security: a review of current applications and security solutions

Saad Khan et al.

JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2017)

Article Computer Science, Information Systems

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption

Ruilong Deng et al.

IEEE INTERNET OF THINGS JOURNAL (2016)

Proceedings Paper Computer Science, Artificial Intelligence

Fog Cloud Caching at Network Edge via Local Hardware Awareness Spaces

Marat Zhanikeev

2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016) (2016)

Article Computer Science, Hardware & Architecture

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks

Mohsen Rezvani et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Computer Science, Theory & Methods

Secure and highly-available aggregation queries in large-scale sensor networks via set sampling

Haifeng Yu

DISTRIBUTED COMPUTING (2011)

Article Computer Science, Information Systems

Secure encrypted-data aggregation for wireless sensor networks

Shih-I Huang et al.

WIRELESS NETWORKS (2010)