4.5 Article

Secure deduplication schemes for content delivery in mobile edge computing

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Theory & Methods

Privacy-Preserving Computation Offloading for Parallel Deep Neural Networks Training

Yunlong Mao et al.

Summary: This article proposes an alternative DNN training strategy for resource-limited users, allowing them to offload their tasks to an untrusted server in a privacy-preserving manner. By studying the possibility of DNN separation and designing a differentially private activation algorithm, the solution is extended to support parallel DNN model training.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)

Article Engineering, Electrical & Electronic

Secure Data Deduplication Protocol for Edge-Assisted Mobile CrowdSensing Services

Jiliang Li et al.

Summary: The paper introduces an efficient and secure data deduplication protocol for edge-assisted mobile crowdsensing services, utilizing certificateless public key cryptography and a novel method to ensure privacy and security attributes, while demonstrating superior performance in terms of minimal computation and communication costs.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2021)

Article Computer Science, Hardware & Architecture

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing

Jianbing Ni et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2020)

Article Computer Science, Information Systems

SEDS: secure and efficient server-aided data deduplication scheme for cloud storage

Sanjeet Kumar Nayak et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2020)

Article Computer Science, Information Systems

Federated Learning in Mobile Edge Networks: A Comprehensive Survey

Wei Yang Bryan Lim et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Cybernetics

P-3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing

Ping Zhao et al.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2020)

Article Computer Science, Theory & Methods

Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks

Qichao Xu et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Information Systems

Follow-Me Cloud: When Cloud Services Follow Mobile Users

Tarik Taleb et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2019)

Article Engineering, Electrical & Electronic

Communication-Aware Container Placement and Reassignment in Large-Scale Internet Data Centers

Liang Lv et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2019)

Article Computer Science, Hardware & Architecture

An Edge-Computing Based Architecture for Mobile Augmented Reality

Jinke Ren et al.

IEEE NETWORK (2019)

Article Engineering, Electrical & Electronic

Edge Computing Security: State of the Art and Challenges

Yinhao Xiao et al.

PROCEEDINGS OF THE IEEE (2019)

Article Computer Science, Information Systems

Secure deduplication with reliable and revocable key management in fog computing

Hyunsoo Kwon et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2019)

Article Automation & Control Systems

Secure Content Delivery With Edge Nodes to Save Caching Resources for Mobile Users in Green Cities

Qichao Xu et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Engineering, Electrical & Electronic

Integrated Networking, Caching, and Computing for Connected Vehicles: A Deep Reinforcement Learning Approach

Ying He et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2018)

Article Computer Science, Information Systems

A Survey on Mobile Edge Computing: The Communication Perspective

Yuyi Mao et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Computer Science, Theory & Methods

Secure and Efficient Cloud Data Deduplication With Randomized Tag

Tao Jiang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

Secure similarity-based cloud data deduplication in Ubiquitous city

Jinfeng Liu et al.

PERVASIVE AND MOBILE COMPUTING (2017)

Article Computer Science, Hardware & Architecture

Secure Distributed Deduplication Systems with Improved Reliability

Jin Li et al.

IEEE TRANSACTIONS ON COMPUTERS (2015)

Article Computer Science, Hardware & Architecture

CONCERT: A CLOUD-BASED ARCHITECTURE FOR NEXT-GENERATION CELLULAR SYSTEMS

Jingchu Liu et al.

IEEE WIRELESS COMMUNICATIONS (2014)