4.7 Article

Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

A High Reliable Computing Offloading Strategy Using Deep Reinforcement Learning for IoVs in Edge Computing

Kun Wang et al.

Summary: A high reliable computing offloading strategy based on edge computing is proposed, which optimizes the allocation of communication and computing resources using Q-learning, reducing system overhead effectively with minimal impact on delay. Experimental results show fast convergence and effectiveness of the strategy compared to other approaches.

JOURNAL OF GRID COMPUTING (2021)

Article Computer Science, Information Systems

Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services

Oladayo Olufemi Olakanmi et al.

Summary: Mobile cloud computing combines cloud computing with mobile devices, facing security and privacy attacks, while also encountering challenges in restricting user subscriptions to services.

COMPUTERS & SECURITY (2021)

Article Computer Science, Information Systems

Faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things

Oladayo Olufemi Olakanmi et al.

Summary: The volume of outsourced IIoT data to cloud servers is exponentially increasing due to the increase in the number of devices and duplicity in their data. This has raised cost and storage overheads, while outsourcing data to semi-trusted servers poses security challenges. Encryption techniques have been proposed for secure de-duplication, but some are computationally intensive and do not meet necessary security requirements, particularly in scenarios like the Inside Keyword Guess Attack.

INTERNET OF THINGS (2021)

Article Computer Science, Information Systems

FEACS: A fog enhanced expressible access control scheme with secure services delegation among carers in E-health systems

Oladayo Olakanmi et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Verifiable outsourced computation over encrypted data

Xixun Yu et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Theory & Methods

Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design

Christian Esposito et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2017)

Article Computer Science, Theory & Methods

Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence

Zhaohong Wang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2017)

Article Computer Science, Information Systems

An Efficient Privacy-Preserving Outsourced Computation over Public Data

Ximeng Liu et al.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2017)

Proceedings Paper Computer Science, Information Systems

How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior

Elissa M. Redmiles et al.

CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2016)

Article Computer Science, Information Systems

Image Enhancement in Encrypted Domain over Cloud

Ankita Lathey et al.

ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS (2015)

Article Computer Science, Hardware & Architecture

New Publicly Verifiable Databases with Efficient Updates

Xiaofeng Chen et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Telecommunications

A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing

Yang Pan et al.

CHINA COMMUNICATIONS (2014)