相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Location Privacy Protection via Delocalization in 5G Mobile Edge Computing Environment
Guangming Cui et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)
Efficient Verification of Edge Data Integrity in Edge Computing Environment
Guangming Cui et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)
Secure deduplication schemes for content delivery in mobile edge computing
Yu Lin et al.
COMPUTERS & SECURITY (2022)
A Game-Theoretical Approach for Mitigating Edge DDoS Attack
Qiang He et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)
Inspecting Edge Data Integrity With Aggregate Signature in Distributed Edge Computing Environment
Bo Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
Auditing Cache Data Integrity in the Edge Computing Environment
Bo Li et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2021)
Cooperative Assurance of Cache Data Integrity for Mobile Edge Computing
Bo Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)
A Survey on End-Edge-Cloud Orchestrated Network Computing Paradigms: Transparent Computing, Mobile Edge Computing, Fog Computing, and Cloudlet
Ju Ren et al.
ACM COMPUTING SURVEYS (2020)
A Blockchain-Based Trusted Data Management Scheme in Edge Computing
Ma Zhaofeng et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)
Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks
Qichao Xu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)
Edge Computing Security: State of the Art and Challenges
Yinhao Xiao et al.
PROCEEDINGS OF THE IEEE (2019)
Privacy-Preserving Data Integrity Verification in Mobile Edge Computing
Wei Tong et al.
2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)
Location Privacy in Mobile Edge Clouds: A Chaff-Based Approach
Ting He et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)
Fair Caching Algorithms for Peer Data Sharing in Pervasive Edge Computing Environments
Yaodong Huang et al.
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) (2017)
EdgeCourier: An Edge-hosted Personal Service for Low-bandwidth Document Synchronization in Mobile Cloud Storage Services
Pengzhan Hao et al.
SEC 2017: 2017 THE SECOND ACM/IEEE SYMPOSIUM ON EDGE COMPUTING (SEC'17) (2017)
Cachier: Edge-caching for recognition applications
Utsav Drolia et al.
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017) (2017)
Efficient Placement of Multi-Component Applications in Edge Computing Systems
Tayebeh Bahreini et al.
SEC 2017: 2017 THE SECOND ACM/IEEE SYMPOSIUM ON EDGE COMPUTING (SEC'17) (2017)
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud
Jiangtao Li et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)
2-Server PIR with Subpolynomial Communication
Zeev Dvir et al.
JOURNAL OF THE ACM (2016)
Edge Computing: Vision and Challenges
Weisong Shi et al.
IEEE INTERNET OF THINGS JOURNAL (2016)
Mobile-Edge Computing Architecture The role of MEC in the Internet of Things
Dario Sabella et al.
IEEE CONSUMER ELECTRONICS MAGAZINE (2016)
Poster Abstract: EdgeStore: Integrating Edge Computing into Cloud-Based Storage Systems
Zijiang Hao et al.
2016 FIRST IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2016) (2016)
Poster Abstract: Edge-caches for vision applications
Utsav Drolia et al.
2016 FIRST IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2016) (2016)
Establishing Trusted Identities in Disconnected Edge Environments
Sebastian Echeverria et al.
2016 FIRST IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2016) (2016)
Edge-centric Computing: Vision and Challenges
Pedro Garcia Lopez et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2015)
Edge-centric Computing: Vision and Challenges
Pedro Garcia Lopez et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2015)
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability
Zhuo Hao et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2011)
The Case for VM-Based Cloudlets in Mobile Computing
Mahadev Satyanarayanan et al.
IEEE PERVASIVE COMPUTING (2009)
Efficient remote data possession checking in critical information infrastructures
Francesc Sebe et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2008)
A geometric approach to information-theoretic private information retrieval
David Woodruff et al.
SIAM JOURNAL ON COMPUTING (2007)