default search action
Search dblp for Publications
export results for "secure computing"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/access/BozkayaAras24, author = {Elif Bozkaya{-}Aras}, title = {Blockchain-Based Secure Content Caching and Computation for Edge Computing}, journal = {{IEEE} Access}, volume = {12}, pages = {47619--47629}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3383474}, doi = {10.1109/ACCESS.2024.3383474}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/BozkayaAras24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HanSKCL24, author = {Boyoung Han and Hojune Shin and Yeonghyeon Kim and Jina Choi and Younho Lee}, title = {HEaaN-NB: Non-Interactive Privacy-Preserving Naive Bayes Using {CKKS} for Secure Outsourced Cloud Computing}, journal = {{IEEE} Access}, volume = {12}, pages = {110762--110780}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3438161}, doi = {10.1109/ACCESS.2024.3438161}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HanSKCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NazihBLC24, author = {Ossama Nazih and Nabil Benamar and Hanane Lamaazi and Habiba Choaui}, title = {Toward Secure and Trustworthy Vehicular Fog Computing: {A} Survey}, journal = {{IEEE} Access}, volume = {12}, pages = {35154--35171}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3371488}, doi = {10.1109/ACCESS.2024.3371488}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NazihBLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SingamaneniMA24, author = {Kranthi Kumar Singamaneni and Ghulam Muhammad and Zulfiqar Ali}, title = {A Novel Quantum Hash-Based Attribute-Based Encryption Approach for Secure Data Integrity and Access Control in Mobile Edge Computing-Enabled Customer Behavior Analysis}, journal = {{IEEE} Access}, volume = {12}, pages = {37378--37397}, year = {2024}, url = {https://doi.org/10.1109/ACCESS.2024.3373648}, doi = {10.1109/ACCESS.2024.3373648}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SingamaneniMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/HuoLGWJ24, author = {Yan Huo and Qiyuan Liu and Qinghe Gao and Yingzhen Wu and Tao Jing}, title = {Joint task offloading and resource allocation for secure OFDMA-based mobile edge computing systems}, journal = {Ad Hoc Networks}, volume = {153}, pages = {103342}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2023.103342}, doi = {10.1016/J.ADHOC.2023.103342}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/HuoLGWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/MouraAL24, author = {Douglas L. L. Moura and Andr{\'{e}} L. L. de Aquino and Antonio A. F. Loureiro}, title = {An edge computing and distributed ledger technology architecture for secure and efficient transportation}, journal = {Ad Hoc Networks}, volume = {164}, pages = {103633}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103633}, doi = {10.1016/J.ADHOC.2024.103633}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/MouraAL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhaoZWWL24, author = {Xu Zhao and Tianhao Zhao and Feiyu Wang and Yichuan Wu and Maozhen Li}, title = {SAC-based {UAV} mobile edge computing for energy minimization and secure data transmission}, journal = {Ad Hoc Networks}, volume = {157}, pages = {103435}, year = {2024}, url = {https://doi.org/10.1016/j.adhoc.2024.103435}, doi = {10.1016/J.ADHOC.2024.103435}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhaoZWWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/NawshinGUAS24, author = {Faria Nawshin and Radwa Gad and Devrim Unal and Abdulla Khalid Al{-}Ali and Ponnuthurai N. Suganthan}, title = {Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: {A} comprehensive survey}, journal = {Comput. Electr. Eng.}, volume = {117}, pages = {109233}, year = {2024}, url = {https://doi.org/10.1016/j.compeleceng.2024.109233}, doi = {10.1016/J.COMPELECENG.2024.109233}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/NawshinGUAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/SedjelmaciA24, author = {Hichem Sedjelmaci and Nirwan Ansari}, title = {On Cooperative Federated Defense to Secure Multiaccess Edge Computing}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {13}, number = {4}, pages = {24--31}, year = {2024}, url = {https://doi.org/10.1109/MCE.2022.3167527}, doi = {10.1109/MCE.2022.3167527}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/SedjelmaciA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/AlzahraniK24, author = {Abdulrahman Alzahrani and Rafiq Ahmad Khan}, title = {Secure software design evaluation and decision making model for ubiquitous computing: {A} two-stage ANN-Fuzzy {AHP} approach}, journal = {Comput. Hum. Behav.}, volume = {153}, pages = {108109}, year = {2024}, url = {https://doi.org/10.1016/j.chb.2023.108109}, doi = {10.1016/J.CHB.2023.108109}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chb/AlzahraniK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/LiuWLYZ24, author = {Jiasen Liu and Xu An Wang and Guofeng Li and Dan Yu and Jindan Zhang}, title = {Improved secure {PCA} and {LDA} algorithms for intelligent computing in IoT-to-cloud setting}, journal = {Comput. Intell.}, volume = {40}, number = {1}, year = {2024}, url = {https://doi.org/10.1111/coin.12613}, doi = {10.1111/COIN.12613}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/LiuWLYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AgrawalSS24, author = {Ruchi Agrawal and Saurabh Singhal and Ashish Sharma}, title = {Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm}, journal = {Clust. Comput.}, volume = {27}, number = {6}, pages = {8015--8030}, year = {2024}, url = {https://doi.org/10.1007/s10586-024-04411-9}, doi = {10.1007/S10586-024-04411-9}, timestamp = {Fri, 13 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/AgrawalSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AkbarWMB24, author = {Mohd Akbar and Mohammed Mujtaba Waseem and Syeda Husna Mehanoor and Praveen Barmavatu}, title = {Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing}, journal = {Clust. Comput.}, volume = {27}, number = {7}, pages = {9091--9105}, year = {2024}, url = {https://doi.org/10.1007/s10586-024-04481-9}, doi = {10.1007/S10586-024-04481-9}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/AkbarWMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/MiaoWWGHR24, author = {Junfeng Miao and Zhaoshun Wang and Mei Wang and Sahil Garg and M. Shamim Hossain and Joel J. P. C. Rodrigues}, title = {Secure and efficient communication approaches for Industry 5.0 in edge computing}, journal = {Comput. Networks}, volume = {242}, pages = {110244}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110244}, doi = {10.1016/J.COMNET.2024.110244}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/MiaoWWGHR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PeiYDLH24, author = {Hongmei Pei and Peng Yang and Miao Du and Zengyu Liang and Zhongjian Hu}, title = {Blockchain-assisted Verifiable Secure Multi-Party Data Computing}, journal = {Comput. Networks}, volume = {253}, pages = {110712}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110712}, doi = {10.1016/J.COMNET.2024.110712}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PeiYDLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/XiongXWXS24, author = {Runqun Xiong and Qing Xiao and Zhoujie Wang and Zhuqing Xu and Feng Shan}, title = {Leveraging lightweight blockchain for secure collaborative computing in {UAV} Ad-Hoc Networks}, journal = {Comput. Networks}, volume = {251}, pages = {110612}, year = {2024}, url = {https://doi.org/10.1016/j.comnet.2024.110612}, doi = {10.1016/J.COMNET.2024.110612}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/XiongXWXS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/BojjaganiBKSB24, author = {Sriramulu Bojjagani and D. R. Denslin Brabin and Kalai Kumar and Neeraj Kumar Sharma and Umamaheswararao Batta}, title = {Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems}, journal = {Computing}, volume = {106}, number = {7}, pages = {2427--2458}, year = {2024}, url = {https://doi.org/10.1007/s00607-024-01291-0}, doi = {10.1007/S00607-024-01291-0}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/BojjaganiBKSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HuoZQWZ24, author = {Yachao Huo and Zongqu Zhao and Panke Qin and Shujing Wang and Chengfu Zheng}, title = {Post-quantum secure two-party computing protocols against malicious adversaries}, journal = {Concurr. Comput. Pract. Exp.}, volume = {36}, number = {4}, year = {2024}, url = {https://doi.org/10.1002/cpe.7923}, doi = {10.1002/CPE.7923}, timestamp = {Mon, 11 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/HuoZQWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/SreeHT24, author = {Thankaraja Raja Sree and R. Harish and Veni Thangaraj}, title = {FogSec: {A} secure and effective mutual authentication scheme for fog computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {36}, number = {12}, year = {2024}, url = {https://doi.org/10.1002/cpe.8054}, doi = {10.1002/CPE.8054}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/SreeHT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/GuanZWL24, author = {Shaopeng Guan and Conghui Zhang and Yilin Wang and Wenqing Liu}, title = {Hadoop-based secure storage solution for big data in cloud computing environment}, journal = {Digit. Commun. Networks}, volume = {10}, number = {1}, pages = {227--236}, year = {2024}, url = {https://doi.org/10.1016/j.dcan.2023.01.014}, doi = {10.1016/J.DCAN.2023.01.014}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/GuanZWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esi/KaurMLSDS24, author = {Navjeet Kaur and Ayush Mittal and Umesh Kumar Lilhore and Sarita Simaiya and Surjeet Dalal and Yogesh Kumar Sharma}, title = {An adaptive mobility-aware secure handover and scheduling protocol for Earth Observation {(EO)} communication using fog computing}, journal = {Earth Sci. Informatics}, volume = {17}, number = {3}, pages = {2429--2446}, year = {2024}, url = {https://doi.org/10.1007/s12145-024-01291-w}, doi = {10.1007/S12145-024-01291-W}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esi/KaurMLSDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/esi/MMRVD24, author = {Ajitesh M and Deekshith M and Arun Amaithi Rajan and Vetriselvi Vetrian and Hemanth D}, title = {EdgeShield: Attack resistant secure and privacy-aware remote sensing image retrieval system for military and geological applications using edge computing}, journal = {Earth Sci. Informatics}, volume = {17}, number = {3}, pages = {2275--2302}, year = {2024}, url = {https://doi.org/10.1007/s12145-024-01256-z}, doi = {10.1007/S12145-024-01256-Z}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/esi/MMRVD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/CuiSLZZC24, author = {Zhihua Cui and Zhenyu Shi and Qi Li and Tianhao Zhao and Wensheng Zhang and Jinjun Chen}, title = {Cooperative interference to achieve interval many-objective evolutionary algorithm for association privacy secure computing migration}, journal = {Expert Syst. Appl.}, volume = {255}, pages = {124662}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2024.124662}, doi = {10.1016/J.ESWA.2024.124662}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/CuiSLZZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ShrutiRS24, author = {Shruti and Shalli Rani and Gautam Srivastava}, title = {Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme}, journal = {Expert Syst. Appl.}, volume = {235}, pages = {121180}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2023.121180}, doi = {10.1016/J.ESWA.2023.121180}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/ShrutiRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/JanGATAN24, author = {Saeed Ullah Jan and Anwar Ghani and Abdulrahman Alzahrani and Muhammad Usman Tariq and Fahad Algarni and Syed Husnain Abbas Naqvi}, title = {{SKALP:} Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {35}, number = {9}, year = {2024}, url = {https://doi.org/10.1002/ett.5035}, doi = {10.1002/ETT.5035}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/JanGATAN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Krishnan24, author = {Sathish Chander Krishnan}, title = {AI-HybridChain: Picturized authentication and {DRL} based access control method with secure two fold revocation for ensuring cloud computing security}, journal = {Future Gener. Comput. Syst.}, volume = {160}, pages = {389--405}, year = {2024}, url = {https://doi.org/10.1016/j.future.2024.04.054}, doi = {10.1016/J.FUTURE.2024.04.054}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/Krishnan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhangHLL24, author = {Shiwen Zhang and Jiayi He and Wei Liang and Keqin Li}, title = {{MMDS:} {A} secure and verifiable multimedia data search scheme for cloud-assisted edge computing}, journal = {Future Gener. Comput. Syst.}, volume = {151}, pages = {32--44}, year = {2024}, url = {https://doi.org/10.1016/j.future.2023.09.023}, doi = {10.1016/J.FUTURE.2023.09.023}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ZhangHLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/TianLDZW24, author = {Hao Tian and Ruiheng Li and Yi Di and Qiankun Zuo and Jinpeng Wang}, title = {Employing {RNN} and Petri Nets to Secure Edge Computing Threats in Smart Cities}, journal = {J. Grid Comput.}, volume = {22}, number = {1}, pages = {32}, year = {2024}, url = {https://doi.org/10.1007/s10723-023-09733-3}, doi = {10.1007/S10723-023-09733-3}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/grid/TianLDZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/WuLQWL24, author = {Mengru Wu and Kexin Li and Li Ping Qian and Yuan Wu and Inkyu Lee}, title = {Secure Computation Offloading and Service Caching in Mobile Edge Computing Networks}, journal = {{IEEE} Commun. Lett.}, volume = {28}, number = {2}, pages = {432--436}, year = {2024}, url = {https://doi.org/10.1109/LCOMM.2023.3347218}, doi = {10.1109/LCOMM.2023.3347218}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/WuLQWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cps/ZaccagninoCOPM24, author = {Rocco Zaccagnino and Arcangelo Castiglione and Marek R. Ogiela and Florin Pop and Weizhi Meng}, title = {Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing}, journal = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.}, volume = {9}, number = {2}, pages = {99--101}, year = {2024}, url = {https://doi.org/10.1049/cps2.12094}, doi = {10.1049/CPS2.12094}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cps/ZaccagninoCOPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/QianGGLHX24, author = {Jin Qian and Xinmei Gao and Qinghe Gao and Hui Li and Yan Huo and Xiaoshuang Xing}, title = {An enhanced energy efficiency scheme for secure computing in {UAV-MEC} networks}, journal = {Int. J. Sens. Networks}, volume = {44}, number = {1}, pages = {23--35}, year = {2024}, url = {https://doi.org/10.1504/IJSNET.2024.136336}, doi = {10.1504/IJSNET.2024.136336}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijsnet/QianGGLHX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/BounairaAS24, author = {Soumaya Bounaira and Ahmed Alioua and Ismahane Souici}, title = {Blockchain-enabled trust management for secure content caching in mobile edge computing using deep reinforcement learning}, journal = {Internet Things}, volume = {25}, pages = {101081}, year = {2024}, url = {https://doi.org/10.1016/j.iot.2024.101081}, doi = {10.1016/J.IOT.2024.101081}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/BounairaAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/RazaqueKYAAA24, author = {Abdul Razaque and Meenhoon Khan and Joon Yoo and Aziz Alotaibi and Majid Alshammari and Muder Almiani}, title = {Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing}, journal = {Internet Things}, volume = {25}, pages = {101115}, year = {2024}, url = {https://doi.org/10.1016/j.iot.2024.101115}, doi = {10.1016/J.IOT.2024.101115}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/RazaqueKYAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/BaiFZLY24, author = {Yuhan Bai and Kai Fan and Kuan Zhang and Hui Li and Yintang Yang}, title = {{CR-FH-CPABE:} Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {10}, pages = {17727--17739}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3358745}, doi = {10.1109/JIOT.2024.3358745}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/BaiFZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CobblahXGXKO24, author = {Christian Nii Aflah Cobblah and Qi Xia and Jianbin Gao and Hu Xia and Goodlet Akwasi Kusi and Isaac Amankona Obiri}, title = {A Secure and Lightweight NDN-Based Vehicular Network Using Edge Computing and Certificateless Signcryption}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {16}, pages = {27043--27057}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3399031}, doi = {10.1109/JIOT.2024.3399031}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CobblahXGXKO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CuiY24, author = {Hui Cui and Xun Yi}, title = {Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based Encryption With User Revocation}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {3662--3670}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3297997}, doi = {10.1109/JIOT.2023.3297997}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/CuiY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LeeRW24, author = {Hakjun Lee and Jihyeon Ryu and Dongho Won}, title = {Secure and Anonymous Authentication Scheme for Mobile Edge Computing Environments}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {4}, pages = {5798--5815}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3308568}, doi = {10.1109/JIOT.2023.3308568}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LeeRW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuWPLXCXL24, author = {Xin Liu and Ruxue Wang and Lu Peng and Dan Luo and Gang Xu and Xiu{-}Bo Chen and Neal Xiong and Xiaomeng Liu}, title = {Secure Computing Protocols for Internet of Things Data Fusion Based on Set Intersection and Union Against Malicious Enemies}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {14}, pages = {24918--24932}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3385476}, doi = {10.1109/JIOT.2024.3385476}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiuWPLXCXL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuZZLL24, author = {Mengying Xu and Yunxiao Zu and Jie Zhou and Yang Liu and Chaoqun Li}, title = {Energy-Efficient Secure QoS Routing Algorithm Based on Elite Niche Clone Evolutionary Computing for {WSN}}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {8}, pages = {14395--14415}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3342091}, doi = {10.1109/JIOT.2023.3342091}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/XuZZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangLWLLW24, author = {Shaobo Zhang and Qi Liu and Tian Wang and Wei Liang and Kuan{-}Ching Li and Guojun Wang}, title = {{FSAIR:} Fine-Grained Secure Approximate Image Retrieval for Mobile Cloud Computing}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {13}, pages = {23297--23308}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2024.3384458}, doi = {10.1109/JIOT.2024.3384458}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangLWLLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangWWPWL24, author = {Linru Zhang and Xiangning Wang and Jiabo Wang and Rachael Pung and Huaxiong Wang and Kwok{-}Yan Lam}, title = {An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {9}, pages = {15272--15284}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3348122}, doi = {10.1109/JIOT.2023.3348122}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangWWPWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangZY24, author = {Zufan Zhang and Kewen Zeng and Yinxue Yi}, title = {Blockchain-Empowered Secure Aerial Edge Computing for AIoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {1}, pages = {84--94}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3294222}, doi = {10.1109/JIOT.2023.3294222}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhangZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/GhadiSMSOH24, author = {Yazeed Yasin Ghadi and Syed Faisal Abbas Shah and Tehseen Mazhar and Tariq Shahzad and Khmaies Ouahada and Habib Hamam}, title = {Enhancing patient healthcare with mobile edge computing and 5G: challenges and solutions for secure online health tools}, journal = {J. Cloud Comput.}, volume = {13}, number = {1}, pages = {93}, year = {2024}, url = {https://doi.org/10.1186/s13677-024-00654-4}, doi = {10.1186/S13677-024-00654-4}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/GhadiSMSOH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/MiaoXZZLWM24, author = {Weiwei Miao and Yuanyi Xia and Rui Zhang and Xinjian Zhao and Qianmu Li and Tao Wang and Shunmei Meng}, title = {A secure data interaction method based on edge computing}, journal = {J. Cloud Comput.}, volume = {13}, number = {1}, pages = {61}, year = {2024}, url = {https://doi.org/10.1186/s13677-024-00617-9}, doi = {10.1186/S13677-024-00617-9}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/MiaoXZZLWM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/ThangarajS24, author = {Veni Thangaraj and Thankaraja Raja Sree}, title = {{MSCO:} Mobility-aware Secure Computation Offloading in blockchain-enabled Fog computing environments}, journal = {J. Cloud Comput.}, volume = {13}, number = {1}, pages = {88}, year = {2024}, url = {https://doi.org/10.1186/s13677-024-00599-8}, doi = {10.1186/S13677-024-00599-8}, timestamp = {Tue, 16 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/ThangarajS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/AbdoKY24, author = {A. Abdo and Taghreed S. Karamany and Ahmed Yakoub}, title = {A hybrid approach to secure and compress data streams in cloud computing environment}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {36}, number = {3}, pages = {101999}, year = {2024}, url = {https://doi.org/10.1016/j.jksuci.2024.101999}, doi = {10.1016/J.JKSUCI.2024.101999}, timestamp = {Tue, 09 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/AbdoKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SinghSMH24, author = {Gursharan Singh and Parminder Singh and Anas Motii and Mustapha Hedabou}, title = {A secure and lightweight container migration technique in cloud computing}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {36}, number = {1}, pages = {101887}, year = {2024}, url = {https://doi.org/10.1016/j.jksuci.2023.101887}, doi = {10.1016/J.JKSUCI.2023.101887}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/SinghSMH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/PremkumarS24, author = {N. Premkumar and R. Santhosh}, title = {Pelican optimization algorithm with blockchain for secure load balancing in fog computing}, journal = {Multim. Tools Appl.}, volume = {83}, number = {18}, pages = {53417--53439}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-17632-8}, doi = {10.1007/S11042-023-17632-8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/PremkumarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ReddyRKK24, author = {M. Indrasena Reddy and P. Venkateswara Rao and Talluri Sunil Kumar and Srinivasa Reddy K}, title = {Encryption with access policy and cloud data selection for secure and energy-efficient cloud computing}, journal = {Multim. Tools Appl.}, volume = {83}, number = {6}, pages = {15649--15675}, year = {2024}, url = {https://doi.org/10.1007/s11042-023-16082-6}, doi = {10.1007/S11042-023-16082-6}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/ReddyRKK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/ChakrabortyOAS24, author = {Chinmay Chakraborty and Soufiene Ben Othman and Faris A. Almalki and Hedi Sakli}, title = {{FC-SEEDA:} fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things}, journal = {Neural Comput. Appl.}, volume = {36}, number = {1}, pages = {241--257}, year = {2024}, url = {https://doi.org/10.1007/s00521-023-08270-0}, doi = {10.1007/S00521-023-08270-0}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nca/ChakrabortyOAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/SedjelmaciA24, author = {Hichem Sedjelmaci and Nirwan Ansari}, title = {Zero Trust Architecture Empowered Attack Detection Framework to Secure 6G Edge Computing}, journal = {{IEEE} Netw.}, volume = {38}, number = {1}, pages = {196--202}, year = {2024}, url = {https://doi.org/10.1109/MNET.131.2200513}, doi = {10.1109/MNET.131.2200513}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/SedjelmaciA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/CicconettiCP24, author = {Claudio Cicconetti and Marco Conti and Andrea Passarella}, title = {Analysis of micro- vs. macro-flows management in QKD-secured edge computing}, journal = {Pervasive Mob. Comput.}, volume = {102}, pages = {101937}, year = {2024}, url = {https://doi.org/10.1016/j.pmcj.2024.101937}, doi = {10.1016/J.PMCJ.2024.101937}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/CicconettiCP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SangeethapriyaAR24, author = {J. Sangeethapriya and Michael Arock and U. Srinivasulu Reddy}, title = {Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based authentication for IoT edge computing}, journal = {Peer Peer Netw. Appl.}, volume = {17}, number = {4}, pages = {1885--1897}, year = {2024}, url = {https://doi.org/10.1007/s12083-024-01667-1}, doi = {10.1007/S12083-024-01667-1}, timestamp = {Mon, 24 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SangeethapriyaAR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/PalanivelM24, author = {R. Palanivel and P. Muthulakshmi}, title = {Error mitigation using quantum neural {Q} network in secure qutrit distribution on Cleve's protocol on quantum computing}, journal = {Quantum Inf. Process.}, volume = {23}, number = {4}, pages = {147}, year = {2024}, url = {https://doi.org/10.1007/s11128-024-04342-9}, doi = {10.1007/S11128-024-04342-9}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/PalanivelM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/RahmaniPB24, author = {Zeinab Rahmani and Armando Nolasco Pinto and Lu{\'{\i}}s Soares Barbosa}, title = {Secure two-party computation via measurement-based quantum computing}, journal = {Quantum Inf. Process.}, volume = {23}, number = {6}, pages = {221}, year = {2024}, url = {https://doi.org/10.1007/s11128-024-04433-7}, doi = {10.1007/S11128-024-04433-7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/RahmaniPB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/KarnatakMTWSD24, author = {Vijay Karnatak and Amit Kumar Mishra and Neha Tripathi and Mohammad Wazid and Jaskaran Singh and Ashok Kumar Das}, title = {A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications}, journal = {Secur. Priv.}, volume = {7}, number = {2}, year = {2024}, url = {https://doi.org/10.1002/spy2.353}, doi = {10.1002/SPY2.353}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/KarnatakMTWSD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/MiaoZ24, author = {Zhifeng Miao and Chunping Zhao}, title = {Secure Encrypted Transmission of Network Data in Cloud Computing Technology Environment}, journal = {Scalable Comput. Pract. Exp.}, volume = {25}, number = {4}, pages = {2671--2678}, year = {2024}, url = {https://doi.org/10.12694/scpe.v25i4.2980}, doi = {10.12694/SCPE.V25I4.2980}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scpe/MiaoZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlviASAAA24, author = {Ahmad Naseem Alvi and Bakhtiar Ali and Mohamed Saad Saleh and Mohammed Alkhathami and Deafallah Alsadie and Bushra Alghamdi}, title = {Secure Computing for Fog-Enabled Industrial IoT}, journal = {Sensors}, volume = {24}, number = {7}, pages = {2098}, year = {2024}, url = {https://doi.org/10.3390/s24072098}, doi = {10.3390/S24072098}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AlviASAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/AhmedKS24, author = {Feroz Ahmed and Sumit Kumar and Pradeep Kumar Singh}, title = {Variable Neighborhood Search Based Human Learning Optimization Algorithm for Secure Data Analysis and Computing}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {5}, pages = {557}, year = {2024}, url = {https://doi.org/10.1007/s42979-024-02883-5}, doi = {10.1007/S42979-024-02883-5}, timestamp = {Fri, 28 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/AhmedKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/ET24, author = {Geetha Rani E and Chetana Tukkoji}, title = {Secure Data Storage in Cloud Computing Using Code Based McEliece and {NTRU} Cryptosystems}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {4}, pages = {396}, year = {2024}, url = {https://doi.org/10.1007/s42979-024-02736-1}, doi = {10.1007/S42979-024-02736-1}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/ET24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/KodadaDK24, author = {Basappa B. Kodada and Demian Antony D'Mello and D. K. Santhosh Kumar}, title = {Finite State Automata Based Cryptosystem for Secure Data Sharing and De-duplication in Cloud Computing}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {6}, pages = {774}, year = {2024}, url = {https://doi.org/10.1007/s42979-024-03101-y}, doi = {10.1007/S42979-024-03101-Y}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/KodadaDK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/MondalC24, author = {Avijit Mondal and Pinaki Sankar Chatterjee}, title = {CloudSec: {A} Lightweight and Agile Approach to Secure Medical Image Transmission in the Cloud Computing Environment}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {2}, pages = {237}, year = {2024}, url = {https://doi.org/10.1007/s42979-023-02539-w}, doi = {10.1007/S42979-023-02539-W}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/MondalC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/PuthalMM24, author = {Deepak Puthal and Amit Kumar Mishra and Sambit Kumar Mishra}, title = {Special issue on collaborative edge computing for secure and scalable Internet of Things}, journal = {Softw. Pract. Exp.}, volume = {54}, number = {7}, pages = {1215--1216}, year = {2024}, url = {https://doi.org/10.1002/spe.3337}, doi = {10.1002/SPE.3337}, timestamp = {Wed, 19 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/PuthalMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LiZSCYL24, author = {Shiyu Li and Yuan Zhang and Yaqing Song and Nan Cheng and Kan Yang and Hongwei Li}, title = {Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: {A} Universally Composable Secure Solution}, journal = {{IEEE} Trans. Computers}, volume = {73}, number = {4}, pages = {1114--1125}, year = {2024}, url = {https://doi.org/10.1109/TC.2024.3355759}, doi = {10.1109/TC.2024.3355759}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LiZSCYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LvCCSL24, author = {Zhihan Lv and Dongliang Chen and Bin Cao and Houbing Song and Haibin Lv}, title = {Secure Deep Learning in Defense in Deep-Learning-as-a-Service Computing Systems in Digital Twins}, journal = {{IEEE} Trans. Computers}, volume = {73}, number = {3}, pages = {656--668}, year = {2024}, url = {https://doi.org/10.1109/TC.2021.3077687}, doi = {10.1109/TC.2021.3077687}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LvCCSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/YelluCY24, author = {Pruthvy Yellu and Nishanth Goud Chennagouni and Qiaoyan Yu}, title = {{INEAD:} Intermediate Node Evaluation-Based Attack Detection for Secure Approximate Computing Systems}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {43}, number = {3}, pages = {716--727}, year = {2024}, url = {https://doi.org/10.1109/TCAD.2023.3328826}, doi = {10.1109/TCAD.2023.3328826}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcad/YelluCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/ConsulBG24, author = {Prakhar Consul and Ishan Budhiraja and Deepak Garg}, title = {A Hybrid Secure Resource Allocation and Trajectory Optimization Approach for Mobile Edge Computing Using Federated Learning Based on {WEB} 3.0}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {70}, number = {1}, pages = {1167--1179}, year = {2024}, url = {https://doi.org/10.1109/TCE.2023.3339853}, doi = {10.1109/TCE.2023.3339853}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/ConsulBG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ZhengCWZNA24, author = {Tong{-}Xing Zheng and Xin Chen and Yating Wen and Ning Zhang and Derrick Wing Kwan Ng and Naofal Al{-}Dhahir}, title = {Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks}, journal = {{IEEE} Trans. Commun.}, volume = {72}, number = {4}, pages = {2152--2165}, year = {2024}, url = {https://doi.org/10.1109/TCOMM.2023.3342242}, doi = {10.1109/TCOMM.2023.3342242}, timestamp = {Thu, 08 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/ZhengCWZNA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DuttaPD24, author = {Subhranil Dutta and Tapas Pal and Ratna Dutta}, title = {Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting}, journal = {Theor. Comput. Sci.}, volume = {995}, pages = {114502}, year = {2024}, url = {https://doi.org/10.1016/j.tcs.2024.114502}, doi = {10.1016/J.TCS.2024.114502}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/DuttaPD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShadabZGAL24, author = {Rakin Muhammad Shadab and Yu Zou and Sanjay Gandham and Amro Awad and Mingjie Lin}, title = {A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle Tree for FPGA-Attached Embedded Memory}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {3262--3279}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3324935}, doi = {10.1109/TDSC.2023.3324935}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShadabZGAL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/WuLLVGA24, author = {Fan Wu and Xiong Li and Jingwei Li and Pandi Vijayakumar and Brij B. Gupta and Varsha Arya}, title = {{HSADR:} {A} New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {8}, number = {3}, pages = {1141--1155}, year = {2024}, url = {https://doi.org/10.1109/TGCN.2024.3441532}, doi = {10.1109/TGCN.2024.3441532}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgcn/WuLLVGA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuWYMCZL24, author = {Zhusen Liu and Weizheng Wang and Yutong Ye and Nan Min and Zhenfu Cao and Lu Zhou and Zhe Liu}, title = {Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {7019--7032}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3428410}, doi = {10.1109/TIFS.2024.3428410}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuWYMCZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangZWGFL24, author = {Na Wang and Wen Zhou and Jingjing Wang and Yifan Guo and Junsong Fu and Jianwei Liu}, title = {Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2454--2469}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3350909}, doi = {10.1109/TIFS.2024.3350909}, timestamp = {Sat, 27 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangZWGFL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuZL24, author = {Jiahui Wu and Weizhe Zhang and Fucai Luo}, title = {On the Security of "LSFL: {A} Lightweight and Secure Federated Learning Scheme for Edge Computing"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3481--3482}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3331274}, doi = {10.1109/TIFS.2023.3331274}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZWZ24, author = {Rui Zhang and Lei Zhang and Qian Wu and Jianying Zhou}, title = {Secure Channel Establishment Scheme for Task Delivery in Vehicular Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {2865--2880}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3356809}, doi = {10.1109/TIFS.2024.3356809}, timestamp = {Tue, 13 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhengZLZGWSL24, author = {Yandong Zheng and Hui Zhu and Rongxing Lu and Songnian Zhang and Yunguo Guan and Fengwei Wang and Jun Shao and Hui Li}, title = {Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {6237--6251}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3413630}, doi = {10.1109/TIFS.2024.3413630}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhengZLZGWSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/XuXCCLA24, author = {Jianpeng Xu and Aoshuo Xu and Liangyu Chen and Yali Chen and Xiaolin Liang and Bo Ai}, title = {Deep Reinforcement Learning for RIS-Aided Secure Mobile Edge Computing in Industrial Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {20}, number = {2}, pages = {2455--2464}, year = {2024}, url = {https://doi.org/10.1109/TII.2023.3292968}, doi = {10.1109/TII.2023.3292968}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/XuXCCLA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/JuCCLPMDG24, author = {Ying Ju and Zhiwei Cao and Yuchao Chen and Lei Liu and Qingqi Pei and Shahid Mumtaz and Mianxiong Dong and Mohsen Guizani}, title = {NOMA-Assisted Secure Offloading for Vehicular Edge Computing Networks With Asynchronous Deep Reinforcement Learning}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {3}, pages = {2627--2640}, year = {2024}, url = {https://doi.org/10.1109/TITS.2023.3320861}, doi = {10.1109/TITS.2023.3320861}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/JuCCLPMDG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/SaleemLMTAD24, author = {Muhammad Asad Saleem and Xiong Li and Khalid Mahmood and Tayyaba Tariq and Mohammed J. F. Alenazi and Ashok Kumar Das}, title = {Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {9}, pages = {12528--12537}, year = {2024}, url = {https://doi.org/10.1109/TITS.2024.3371464}, doi = {10.1109/TITS.2024.3371464}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/SaleemLMTAD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tiv/XiaZGSHL24, author = {Zhuoqun Xia and Lingxuan Zeng and Ke Gu and Chao Su and Hangyu Hu and Kejun Long}, title = {Secure and Lightweight Vehicular Privacy Preservation Scheme Under Fog Computing-Based IoVs}, journal = {{IEEE} Trans. Intell. Veh.}, volume = {9}, number = {2}, pages = {4115--4129}, year = {2024}, url = {https://doi.org/10.1109/TIV.2023.3303312}, doi = {10.1109/TIV.2023.3303312}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tiv/XiaZGSHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/AlavizadehEMS24, author = {Alavieh Sadat Alavizadeh and Seyed Hossein Erfani and Meghdad Mirabi and Amir Sahafi}, title = {An efficient distributed and secure algorithm for transaction confirmation in {IOTA} using cloud computing}, journal = {J. Supercomput.}, volume = {80}, number = {2}, pages = {1491--1521}, year = {2024}, url = {https://doi.org/10.1007/s11227-023-05525-4}, doi = {10.1007/S11227-023-05525-4}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/AlavizadehEMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/QiZ24, author = {Lijun Qi and Jincheng Zhuang}, title = {RLWE-based public key searchable encryption: securer, faster, and lower end-to-end delay for cloud computing}, journal = {J. Supercomput.}, volume = {80}, number = {2}, pages = {2767--2798}, year = {2024}, url = {https://doi.org/10.1007/s11227-023-05574-9}, doi = {10.1007/S11227-023-05574-9}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/QiZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/RaniRK24, author = {S. Sheeja Rani and P. V. Pravija Raj and Ahmed M. Khedr}, title = {{SDESA:} secure cloud computing with gradient deep belief network and congruential advanced encryption}, journal = {J. Supercomput.}, volume = {80}, number = {15}, pages = {23147--23176}, year = {2024}, url = {https://doi.org/10.1007/s11227-024-06322-3}, doi = {10.1007/S11227-024-06322-3}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/RaniRK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/WenLXTFH24, author = {Wen Wen and Lu Lu and Renchao Xie and Qinqin Tang and Yuexia Fu and Tao Huang}, title = {Secure incentive mechanism for energy trading in computing force networks enabled internet of vehicles: a contract theory approach}, journal = {J. Supercomput.}, volume = {80}, number = {18}, pages = {26061--26087}, year = {2024}, url = {https://doi.org/10.1007/s11227-024-06369-2}, doi = {10.1007/S11227-024-06369-2}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/WenLXTFH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ZhangC24, author = {Shiqiang Zhang and Dongzhi Cao}, title = {A blockchain-based provably secure anonymous authentication for edge computing-enabled IoT}, journal = {J. Supercomput.}, volume = {80}, number = {5}, pages = {6778--6808}, year = {2024}, url = {https://doi.org/10.1007/s11227-023-05696-0}, doi = {10.1007/S11227-023-05696-0}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/ZhangC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/LiuZW24, author = {Jiayue Liu and Jianguo Zhang and Yuncai Wang}, title = {Secure Communication via Chaotic Synchronization Based on Reservoir Computing}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {1}, pages = {285--299}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2022.3173516}, doi = {10.1109/TNNLS.2022.3173516}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/LiuZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SikarwarD24, author = {Himani Sikarwar and Debasis Das}, title = {SecEdge: Secure Edge-Computing-Based Hybrid Approach for Data Collection and Searching in IoV}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {21}, number = {1}, pages = {1213--1225}, year = {2024}, url = {https://doi.org/10.1109/TNSM.2023.3299264}, doi = {10.1109/TNSM.2023.3299264}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/SikarwarD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/HuangMGWJ24, author = {Haiyang Huang and Tianhui Meng and Jianxiong Guo and Xuekai Wei and Weijia Jia}, title = {SecEG: {A} Secure and Efficient Strategy against DDoS Attacks in Mobile Edge Computing}, journal = {{ACM} Trans. Sens. Networks}, volume = {20}, number = {3}, pages = {55:1--55:21}, year = {2024}, url = {https://doi.org/10.1145/3641106}, doi = {10.1145/3641106}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/HuangMGWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/KongQZYLC24, author = {Qinglei Kong and Xiaodong Qu and Songnian Zhang and Feng Yin and Rongxing Lu and Bo Chen}, title = {A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {17}, number = {3}, pages = {761--775}, year = {2024}, url = {https://doi.org/10.1109/TSC.2023.3322432}, doi = {10.1109/TSC.2023.3322432}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/KongQZYLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/CuiZHXZ24, author = {Mengmeng Cui and Haochen Zhang and Yong Huang and Zhanyang Xu and Qingzhan Zhao}, title = {A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service Migration in Edge Computing}, journal = {Wirel. Networks}, volume = {30}, number = {5}, pages = {3643--3656}, year = {2024}, url = {https://doi.org/10.1007/s11276-020-02537-3}, doi = {10.1007/S11276-020-02537-3}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/CuiZHXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/GuoS24, author = {Jingjing Guo and Jiacong Sun}, title = {Secure shortest distance queries over encrypted graph in cloud computing}, journal = {Wirel. Networks}, volume = {30}, number = {4}, pages = {2633--2646}, year = {2024}, url = {https://doi.org/10.1007/s11276-024-03692-7}, doi = {10.1007/S11276-024-03692-7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/GuoS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/PremkumarS24, author = {N. Premkumar and R. Santhosh}, title = {Secure Load Balancing in Fog Computing Using improved Tasmanian Devil Optimization Algorithm with Blockchain}, journal = {Wirel. Pers. Commun.}, volume = {136}, number = {1}, pages = {547--565}, year = {2024}, url = {https://doi.org/10.1007/s11277-024-11321-x}, doi = {10.1007/S11277-024-11321-X}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/PremkumarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asap/SuW24, author = {Haoran Su and Nan Wu}, title = {Deoxys: Defensive Approximate Computing for Secure Graph Neural Networks}, booktitle = {35th {IEEE} International Conference on Application-specific Systems, Architectures and Processors, {ASAP} 2024, Hong Kong, July 24-26, 2024}, pages = {54--60}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ASAP61560.2024.00022}, doi = {10.1109/ASAP61560.2024.00022}, timestamp = {Tue, 10 Sep 2024 15:34:15 +0200}, biburl = {https://dblp.org/rec/conf/asap/SuW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccwc/ZeraatkarKA24, author = {Alireza Abolhasani Zeraatkar and Parnian Shabani Kamran and Hussain Al{-}Asaad}, editor = {Rajashree Paul and Arpita Kundu}, title = {Advancements in Secure Computing: Exploring Automated Repair Debugging and Verification Techniques for Hardware Design}, booktitle = {14th {IEEE} Annual Computing and Communication Workshop and Conference, {CCWC} 2024, Las Vegas, NV, USA, January 8-10, 2024}, pages = {357--364}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CCWC60891.2024.10427806}, doi = {10.1109/CCWC60891.2024.10427806}, timestamp = {Thu, 29 Feb 2024 09:18:18 +0100}, biburl = {https://dblp.org/rec/conf/ccwc/ZeraatkarKA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cmlds/ZhuLGW24, author = {Hongbin Zhu and Yunzhao Li and Haoyu Gu and Wanwan Wang}, title = {Secure Data Sharing Based on {SM9} for Privacy Preserving Computing}, booktitle = {Proceedings of the International Conference on Computing, Machine Learning and Data Science, {CMLDS} 2024, Singapore, April 12-14, 2024}, pages = {34:1--34:4}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3661725.3661761}, doi = {10.1145/3661725.3661761}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cmlds/ZhuLGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csaide/LiuB24, author = {Bin Liu and Eric B. Blancaflor}, title = {Research on federal learning privacy protection based on secure multi-party computing}, booktitle = {Proceedings of the 2024 3rd International Conference on Cyber Security, Artificial Intelligence and Digital Economy, {CSAIDE} 2024, Nanjing, China, March 1-3, 2024}, pages = {142--147}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3672919.3672947}, doi = {10.1145/3672919.3672947}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csaide/LiuB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscwd/YangWCLG024, author = {Qian Yang and Jiankai Wang and Kai Chen and Hongjia Li and Haihua Gao and Zhen Xu}, editor = {Weiming Shen and Jean{-}Paul A. Barth{\`{e}}s and Junzhou Luo and Tie Qiu and Xiaobo Zhou and Jinghui Zhang and Haibin Zhu and Kunkun Peng and Tianyi Xu and Ning Chen}, title = {A Secure Blockchain-based Reputation Scheme for Data Offloading in Edge Computing}, booktitle = {27th International Conference on Computer Supported Cooperative Work in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024}, pages = {2858--2863}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/CSCWD61410.2024.10580334}, doi = {10.1109/CSCWD61410.2024.10580334}, timestamp = {Mon, 29 Jul 2024 16:18:15 +0200}, biburl = {https://dblp.org/rec/conf/cscwd/YangWCLG024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/elinfocom/KimTKB24, author = {Taehoon Kim and Manjoro Ashleigh Tatenda and Soo Mee Kim and Inkyu Bang}, title = {Channel-Aided Random Access for Supporting Secure Edge Computing}, booktitle = {International Conference on Electronics, Information, and Communication, {ICEIC} 2024, Taipei, Taiwan, January 28-31, 2024}, pages = {1--3}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICEIC61013.2024.10457100}, doi = {10.1109/ICEIC61013.2024.10457100}, timestamp = {Tue, 02 Apr 2024 21:06:16 +0200}, biburl = {https://dblp.org/rec/conf/elinfocom/KimTKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChiavassaGFM24, author = {Pietro Chiavassa and Filippo Gandino and Renato Ferrero and Jan Tobias M{\"{u}}hlberg}, title = {Secure Intermittent Computing with {ARM} TrustZone on the Cortex-M}, booktitle = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}PW 2024, Vienna, Austria, July 8-12, 2024}, pages = {160--168}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/EuroSPW61312.2024.00022}, doi = {10.1109/EUROSPW61312.2024.00022}, timestamp = {Thu, 05 Sep 2024 16:02:09 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ChiavassaGFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/AarellaYMK24, author = {Seema G. Aarella and Venkata Prasanth Yanambaka and Saraju P. Mohanty and Elias Kougianos}, editor = {Inna Partin{-}Vaisband and Srinivas Katkoori and Lu Peng and Boris Vaisband and Tooraj Nikoubin}, title = {Fortified-Edge 4.0: {A} ML-Based Error Correction Framework for Secure Authentication in Collaborative Edge Computing}, booktitle = {Proceedings of the Great Lakes Symposium on {VLSI} 2024, {GLSVLSI} 2024, Clearwater, FL, USA, June 12-14, 2024}, pages = {639--644}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3649476.3660384}, doi = {10.1145/3649476.3660384}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/AarellaYMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/LeutheWDB24, author = {Daniel Leuthe and Florian Wei{\ss} and Julian Dersch and Michael Bitzer}, editor = {Tung X. Bui}, title = {Towards Secure Cloud-Computing in FinTechs - An Artefact for Prioritizing Information Security Measures}, booktitle = {57th Hawaii International Conference on System Sciences, {HICSS} 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024}, pages = {4568--4577}, publisher = {ScholarSpace}, year = {2024}, url = {https://hdl.handle.net/10125/106933}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/LeutheWDB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ShadabZL24, author = {Rakin Muhammad Shadab and Yu Zou and Mingjie Lin}, title = {{CTR+:} {A} High-Performance Metadata Access Scheme for Secure Embedded Memory in Heterogeneous Computing Systems}, booktitle = {{IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2024, Tysons Corner, VA, USA, May 6-9, 2024}, pages = {304--308}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/HOST55342.2024.10545394}, doi = {10.1109/HOST55342.2024.10545394}, timestamp = {Wed, 19 Jun 2024 11:19:30 +0200}, biburl = {https://dblp.org/rec/conf/host/ShadabZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpca/NaKLH24, author = {Seonjin Na and Jungwoo Kim and Sunho Lee and Jaehyuk Huh}, title = {Supporting Secure Multi-GPU Computing with Dynamic and Batched Metadata Management}, booktitle = {{IEEE} International Symposium on High-Performance Computer Architecture, {HPCA} 2024, Edinburgh, United Kingdom, March 2-6, 2024}, pages = {204--217}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/HPCA57654.2024.00025}, doi = {10.1109/HPCA57654.2024.00025}, timestamp = {Thu, 02 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpca/NaKLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GauravGCA024a, author = {Akshat Gaurav and Brij B. Gupta and Kwok Tai Chui and Varsha Arya and Jinsong Wu}, title = {Secure Integration of Internet of Things with Cloud Computing Using Optimized Feature Selection and Convolutional Neural Network}, booktitle = {{IEEE} International Conference on Communications Workshops, {ICC} 2024 Workshops, Denver, CO, USA, June 9-13, 2024}, pages = {535--540}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCWorkshops59551.2024.10615516}, doi = {10.1109/ICCWORKSHOPS59551.2024.10615516}, timestamp = {Wed, 21 Aug 2024 14:57:07 +0200}, biburl = {https://dblp.org/rec/conf/icc/GauravGCA024a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/ChenLXLGZ24, author = {Yuliang Chen and Xi Lin and Hansong Xu and Siyi Liao and Jin Guo and Chunming Zou}, title = {Leveraging Blockchain and Coded Computing for Secure Edge Collaborate Learning in Industrial IoT}, booktitle = {33rd International Conference on Computer Communications and Networks, {ICCCN} 2024, Kailua-Kona, HI, USA, July 29-31, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICCCN61486.2024.10637571}, doi = {10.1109/ICCCN61486.2024.10637571}, timestamp = {Tue, 10 Sep 2024 15:34:17 +0200}, biburl = {https://dblp.org/rec/conf/icccn/ChenLXLGZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/JiaSFCSZ24, author = {Guoqing Jia and Changhui Sun and Weidong Fang and Wei Chen and Guannan Song and Wuxiong Zhang}, editor = {De{-}Shuang Huang and Xiankun Zhang and Chuanlei Zhang}, title = {Trusted Secure Routing Schemes Based on Intelligent Computing: {A} Brief Review}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {V} {(LNAI)}}, series = {Lecture Notes in Computer Science}, volume = {14879}, pages = {275--284}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5675-9\_24}, doi = {10.1007/978-981-97-5675-9\_24}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/JiaSFCSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/WangFNYCCZ24, author = {Tian Wang and Weidong Fang and Mufan Ni and Xiaoliang Yang and Wei Chen and Wentao Chen and Wuxiong Zhang}, editor = {De{-}Shuang Huang and Wei Chen and Yijie Pan}, title = {Intelligent Computing Making Access Control More Secure: From Cipher to Trust}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {14869}, pages = {307--317}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5603-2\_25}, doi = {10.1007/978-981-97-5603-2\_25}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icic/WangFNYCCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pais/BounairaAS24, author = {Soumaya Bounaira and Ahmed Alioua and Ismahane Souici}, editor = {Messaoud Abbas and Makhlouf Derdour and Mohammed Mounir Bouhamed and Saci Medileh and Abdelkamel Ben Ali and Nassira Ghoualmi{-}Zine}, title = {Trust-Based Secure Task Offloading in Digital Twin Empowered Vehicular Edge Computing}, booktitle = {6th International Conference on Pattern Analysis and Intelligent Systems, {PAIS} 2024, El Oued, Algeria, April 24-25, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/PAIS62114.2024.10541161}, doi = {10.1109/PAIS62114.2024.10541161}, timestamp = {Sun, 04 Aug 2024 19:39:59 +0200}, biburl = {https://dblp.org/rec/conf/pais/BounairaAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/qse-ne/ZohaibAH24, author = {Muhammad Zohaib and Fahad S. Altuwaijri and Sami Hyrynsalmi}, editor = {Arif Ali Khan and Muhammad Azeem Akbar and Peng Liang}, title = {Integrating Quantum Computing and Blockchain: Building the Foundations of Secure, Efficient 6G Technology}, booktitle = {Proceedings of the 1st {ACM} International Workshop on Quantum Software Engineering: The Next Evolution, {QSE-NE} 2024, Porto de Galinhas, Brazil, 16 July 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3663531.3664755}, doi = {10.1145/3663531.3664755}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/qse-ne/ZohaibAH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/syscon/XieK24, author = {Derock Xie and Anup Kumar}, title = {Encblock: Enclave and Blockchain-enabled Secure Data Sharing and Computing for Power Grids}, booktitle = {{IEEE} International Systems Conference, SysCon 2024, Montreal, QC, Canada, April 15-18, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/SysCon61195.2024.10553589}, doi = {10.1109/SYSCON61195.2024.10553589}, timestamp = {Mon, 24 Jun 2024 15:01:05 +0200}, biburl = {https://dblp.org/rec/conf/syscon/XieK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ZhangGL24, author = {Zhen Zhang and Bing Guo and Chengjie Li}, title = {ComChain: An Efficient and Secure Reputation-Driven Blockchain for Collaborative Edge-End Computing with Sharding}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2024, Dubai, United Arab Emirates, April 21-24, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/WCNC57260.2024.10571075}, doi = {10.1109/WCNC57260.2024.10571075}, timestamp = {Mon, 15 Jul 2024 15:18:26 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/ZhangGL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/DamgardKNOP24, author = {Ivan Damg{\aa}rd and Hannah Keller and Boel Nelson and Claudio Orlandi and Rasmus Pagh}, editor = {Tat{-}Seng Chua and Chong{-}Wah Ngo and Ravi Kumar and Hady W. Lauw and Roy Ka{-}Wei Lee}, title = {Differentially Private Selection from Secure Distributed Computing}, booktitle = {Proceedings of the {ACM} on Web Conference 2024, {WWW} 2024, Singapore, May 13-17, 2024}, pages = {1103--1114}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3589334.3645435}, doi = {10.1145/3589334.3645435}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/DamgardKNOP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-06384, author = {Muhammad Baqer Mollah and Md. Abul Kalam Azad and Yinghui Zhang}, title = {Secure Targeted Message Dissemination in IoT Using Blockchain Enabled Edge Computing}, journal = {CoRR}, volume = {abs/2401.06384}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.06384}, doi = {10.48550/ARXIV.2401.06384}, eprinttype = {arXiv}, eprint = {2401.06384}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-06384.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-12271, author = {Zilinghan Li and Shilan He and Pranshu Chaturvedi and Volodymyr V. Kindratenko and Eliu A. Huerta and Kibaek Kim and Ravi K. Madduri}, title = {Secure Federated Learning Across Heterogeneous Cloud and High-Performance Computing Resources - {A} Case Study on Federated Fine-tuning of LLaMA 2}, journal = {CoRR}, volume = {abs/2402.12271}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.12271}, doi = {10.48550/ARXIV.2402.12271}, eprinttype = {arXiv}, eprint = {2402.12271}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-12271.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-16431, author = {Shanuja Sasi and Onur G{\"{u}}nl{\"{u}}}, title = {Secure Coded Distributed Computing}, journal = {CoRR}, volume = {abs/2404.16431}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.16431}, doi = {10.48550/ARXIV.2404.16431}, eprinttype = {arXiv}, eprint = {2404.16431}, timestamp = {Mon, 03 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-16431.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-17008, author = {Claudio Cicconetti and Dario Sabella and Pietro Noviello and Gennaro Davide Paduanelli}, title = {Quantum-safe Edge Applications: How to Secure Computation in Distributed Computing Systems}, journal = {CoRR}, volume = {abs/2405.17008}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.17008}, doi = {10.48550/ARXIV.2405.17008}, eprinttype = {arXiv}, eprint = {2405.17008}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-17008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-04747, author = {Houming Qiu and Kun Zhu and Nguyen Cong Luong and Dusit Niyato}, title = {Approximated Coded Computing: Towards Fast, Private and Secure Distributed Machine Learning}, journal = {CoRR}, volume = {abs/2406.04747}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.04747}, doi = {10.48550/ARXIV.2406.04747}, eprinttype = {arXiv}, eprint = {2406.04747}, timestamp = {Sat, 13 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-04747.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-19964, author = {Xirong Ma and Chuan Li and Yuchang Hu and Yunting Tao and Yali Jiang and Yanbin Li and Fanyu Kong and Chunpeng Ge}, title = {Secure Outsourced Decryption for HE-based Privacy-preserving Cloud Computing System}, journal = {CoRR}, volume = {abs/2406.19964}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.19964}, doi = {10.48550/ARXIV.2406.19964}, eprinttype = {arXiv}, eprint = {2406.19964}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-19964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-00347, author = {Zefan Wang and Yitong Wang and Jun Zhao}, title = {Resource Allocation and Secure Wireless Communication in the Large Model-based Mobile Edge Computing System}, journal = {CoRR}, volume = {abs/2407.00347}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.00347}, doi = {10.48550/ARXIV.2407.00347}, eprinttype = {arXiv}, eprint = {2407.00347}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-00347.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-08903, author = {Husheng Han and Xinyao Zheng and Yuanbo Wen and Yifan Hao and Erhu Feng and Ling Liang and Jianan Mu and Xiaqing Li and TianYun Ma and Pengwei Jin and Xinkai Song and Zidong Du and Qi Guo and Xing Hu}, title = {TensorTEE: Unifying Heterogeneous {TEE} Granularity for Efficient Secure Collaborative Tensor Computing}, journal = {CoRR}, volume = {abs/2407.08903}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.08903}, doi = {10.48550/ARXIV.2407.08903}, eprinttype = {arXiv}, eprint = {2407.08903}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-08903.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OhbaSGM24, author = {Yoshihiro Ohba and Tomoya Sanuki and Claude Gravel and Kentaro Mihara}, title = {An NVMe-based Secure Computing Platform with FPGA-based {TFHE} Accelerator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2024}, url = {https://eprint.iacr.org/2024/744}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OhbaSGM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasiG24, author = {Shanuja Sasi and Onur G{\"{u}}nl{\"{u}}}, title = {Secure Coded Distributed Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {672}, year = {2024}, url = {https://eprint.iacr.org/2024/672}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasiG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Parimala23, author = {Helen Parimala}, title = {A Secured Architecture for Mitigating Distributed Denial of Service Attack Integrating Internet of Things and Cloud Computing}, school = {Bharathidasan University, Tiruchirappalli, Tamil Nadu, India}, year = {2023}, url = {https://www.grin.com/document/1306455}, urn = {urn:nbn:de:101:1-2023011002311334081172}, isbn = {978-3-346-78836-8}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/dnb/Parimala23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Streit23, author = {Franz{-}Josef Streit}, title = {Techniques to Secure HW/SW-Programmable SoC Architectures for Edge Computing}, school = {University of Erlangen-Nuremberg, Germany}, year = {2023}, url = {https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/21375}, urn = {urn:nbn:de:bvb:29-opus4-213757}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Streit23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Akram23, author = {Ayaz Akram}, title = {Hardware/Software Co-Design for Secure High Performance Computing Systems}, school = {University of California, Davis, {USA}}, year = {2023}, url = {https://www.escholarship.org/uc/item/83r536h8}, timestamp = {Mon, 09 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Akram23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/utcs/Kizza23, author = {Joseph Migga Kizza}, title = {Ethical and Secure Computing - {A} Concise Module, Third Edition}, series = {Undergraduate Topics in Computer Science}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31906-8}, doi = {10.1007/978-3-031-31906-8}, isbn = {978-3-031-31905-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/utcs/Kizza23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GunasekaranK23, author = {Sathish Gunasekaran and Manish Kumar}, title = {Chapter Nine - Secure data communication using {DNA} computing adaptable to wireless sensor network}, journal = {Adv. Comput.}, volume = {129}, pages = {317--361}, year = {2023}, url = {https://doi.org/10.1016/bs.adcom.2022.08.008}, doi = {10.1016/BS.ADCOM.2022.08.008}, timestamp = {Sun, 02 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GunasekaranK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AsaithambiRDVSKA23, author = {Sasikumar Asaithambi and Logesh Ravi and Malathi Devarajan and Subramaniyaswamy Vairavasundaram and A. Selvalakshmi and Ketan Kotecha and Ajith Abraham}, title = {A Decentralized Resource Allocation in Edge Computing for Secure IoT Environments}, journal = {{IEEE} Access}, volume = {11}, pages = {117177--117189}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3325056}, doi = {10.1109/ACCESS.2023.3325056}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AsaithambiRDVSKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IrshadHHAYAAABBR23, author = {Reyazur Rashid Irshad and Shahid Hussain and Ihtisham Hussain and Ibrar Ahmad and Adil Yousif and Ibrahim M. Alwayle and Ahmed Abdu Alattab and Khaled M. Alalayah and John G. Breslin and Mohammed Mehdi Badr and Joel J. P. C. Rodrigues}, title = {An Intelligent Buffalo-Based Secure Edge-Enabled Computing Platform for Heterogeneous IoT Network in Smart Cities}, journal = {{IEEE} Access}, volume = {11}, pages = {69282--69294}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3288815}, doi = {10.1109/ACCESS.2023.3288815}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/IrshadHHAYAAABBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IrshadHHNZAAYA23, author = {Reyazur Rashid Irshad and Shahid Hussain and Ihtisham Hussain and Jamal Abdul Nasir and Asim Zeb and Khaled M. Alalayah and Ahmed Abdu Alattab and Adil Yousif and Ibrahim M. Alwayle}, title = {IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User Systems: {A} Hybrid Post-Quantum Cryptographic and Blockchain-Based Approach Toward a Trustworthy Cloud Computing}, journal = {{IEEE} Access}, volume = {11}, pages = {105479--105498}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3318755}, doi = {10.1109/ACCESS.2023.3318755}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/IrshadHHNZAAYA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanGSAAK23, author = {Imran Khan and Anwar Ghani and Syed Muhammd Saqlain and Muhammad Usman Ashraf and Abdulrahman Alzahrani and DoHyeun Kim}, title = {Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks}, journal = {{IEEE} Access}, volume = {11}, pages = {144560--144573}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3344168}, doi = {10.1109/ACCESS.2023.3344168}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KhanGSAAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/KhezrYB23, author = {Seyed Nima Khezr and Abdulsalam Yassine and Rachid Benlamri}, title = {Towards a secure and dependable IoT data monetization using blockchain and fog computing}, journal = {Clust. Comput.}, volume = {26}, number = {2}, pages = {1551--1564}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03669-1}, doi = {10.1007/S10586-022-03669-1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/KhezrYB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SinghC23, author = {Ashish Singh and Kakali Chatterjee}, title = {Edge computing based secure health monitoring framework for electronic healthcare system}, journal = {Clust. Comput.}, volume = {26}, number = {2}, pages = {1205--1220}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03717-w}, doi = {10.1007/S10586-022-03717-W}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/SinghC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhaoHZZ23, author = {Yan Zhao and Ning Hu and Yue Zhao and Zhihan Zhu}, title = {A secure and flexible edge computing scheme for AI-driven industrial IoT}, journal = {Clust. Comput.}, volume = {26}, number = {1}, pages = {283--301}, year = {2023}, url = {https://doi.org/10.1007/s10586-021-03400-6}, doi = {10.1007/S10586-021-03400-6}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/ZhaoHZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChenNLLL23, author = {Jie Chen and Jiaxu Niu and Hao Lei and Li Lin and Yunhao Ling}, title = {Adaptively secure multi-authority attribute-based broadcast encryption in fog computing}, journal = {Comput. Networks}, volume = {232}, pages = {109844}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109844}, doi = {10.1016/J.COMNET.2023.109844}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChenNLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChengJYZG23, author = {Zhimo Cheng and Xinsheng Ji and Wei You and Yu Zhao and Zhongfu Guo}, title = {{SECHO:} {A} deep reinforcement learning-based scheme for secure handover in mobile edge computing}, journal = {Comput. Networks}, volume = {229}, pages = {109769}, year = {2023}, url = {https://doi.org/10.1016/j.comnet.2023.109769}, doi = {10.1016/J.COMNET.2023.109769}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/ChengJYZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangCWYL23, author = {Yu Wang and Liquan Chen and Ge Wu and Kunliang Yu and Tianyu Lu}, title = {Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing}, journal = {Comput. Secur.}, volume = {128}, pages = {103163}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103163}, doi = {10.1016/J.COSE.2023.103163}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangCWYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangJYWK23, author = {Wenfang Zhang and Heng Jiao and Zhuoqun Yan and Xiaomin Wang and Muhammad Khurram Khan}, title = {Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing}, journal = {Comput. Secur.}, volume = {125}, pages = {103019}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103019}, doi = {10.1016/J.COSE.2022.103019}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangJYWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/CarrizalesEspinozaSCC23, author = {Diana Carrizales{-}Espinoza and Dante D. S{\'{a}}nchez{-}Gallegos and Jos{\'{e}} Luis Gonz{\'{a}}lez Compe{\'{a}}n and Jes{\'{u}}s Carretero}, title = {FedFlow: a federated platform to build secure sharing and synchronization services for health dataflows}, journal = {Computing}, volume = {105}, number = {5}, pages = {1019--1037}, year = {2023}, url = {https://doi.org/10.1007/s00607-021-01044-3}, doi = {10.1007/S00607-021-01044-3}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/CarrizalesEspinozaSCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/WangHMZZ23, author = {Cong Wang and Peng Huo and Maode Ma and Tong Zhou and Yiying Zhang}, title = {A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid}, journal = {Computing}, volume = {105}, number = {11}, pages = {2511--2537}, year = {2023}, url = {https://doi.org/10.1007/s00607-023-01188-4}, doi = {10.1007/S00607-023-01188-4}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/WangHMZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiuWLLL23, author = {Tonglai Liu and Jigang Wu and Jiaxing Li and Jingyi Li and Yidong Li}, title = {Efficient decentralized access control for secure data sharing in cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {17}, year = {2023}, url = {https://doi.org/10.1002/cpe.6383}, doi = {10.1002/CPE.6383}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LiuWLLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csysl/MarcantoniJCB23, author = {Matteo Marcantoni and Bayu Jayawardhana and Mariano Perez Chaher and Kerstin Bunte}, title = {Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization}, journal = {{IEEE} Control. Syst. Lett.}, volume = {7}, pages = {395--400}, year = {2023}, url = {https://doi.org/10.1109/LCSYS.2022.3188944}, doi = {10.1109/LCSYS.2022.3188944}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csysl/MarcantoniJCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/LiuLJ23, author = {Dengzhi Liu and Zhimin Li and Dongbao Jia}, title = {Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100004}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100004}, doi = {10.1016/J.CSA.2022.100004}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/LiuLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SheikM23, author = {Syed Amma Sheik and Amutha Prabakar Muniyandi}, title = {Secure authentication schemes in cloud computing with glimpse of artificial neural networks: {A} review}, journal = {Cyber Secur. Appl.}, volume = {1}, pages = {100002}, year = {2023}, url = {https://doi.org/10.1016/j.csa.2022.100002}, doi = {10.1016/J.CSA.2022.100002}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SheikM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcan/RahmanIBMHT23, author = {Anichur Rahman and Md. Jahidul Islam and Shahab S. Band and Ghulam Muhammad and Kamrul Hasan and Prayag Tiwari}, title = {Towards a blockchain-SDN-based secure architecture for cloud computing in smart industrial IoT}, journal = {Digit. Commun. Networks}, volume = {9}, number = {2}, pages = {411--421}, year = {2023}, url = {https://doi.org/10.1016/j.dcan.2022.11.003}, doi = {10.1016/J.DCAN.2022.11.003}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcan/RahmanIBMHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/BosioBSHT23, author = {Alberto Bosio and Mario Barbareschi and Alessandro Savino and Jie Han and J{\"{u}}rgen Teich}, title = {Special Issue on Approximate Computing: Challenges, Methodologies, Algorithms, and Architectures for Dependable and Secure Systems}, journal = {{IEEE} Des. Test}, volume = {40}, number = {3}, pages = {5--7}, year = {2023}, url = {https://doi.org/10.1109/MDAT.2022.3221909}, doi = {10.1109/MDAT.2022.3221909}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/BosioBSHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/Pande23b, author = {Partha Pratim Pande}, title = {Approximate Computing: Challenges, Methodologies, Algorithms, and Architectures for Dependable and Secure Systems}, journal = {{IEEE} Des. Test}, volume = {40}, number = {3}, pages = {4}, year = {2023}, url = {https://doi.org/10.1109/MDAT.2023.3261801}, doi = {10.1109/MDAT.2023.3261801}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/Pande23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/GowdaMML23, author = {Naveen Chandra Gowda and Sunilkumar S. Manvi and A. Bharathi Malakreddy and Pascal Lorenz}, title = {{BSKM-FC:} Blockchain-based secured key management in a fog computing environment}, journal = {Future Gener. Comput. Syst.}, volume = {142}, pages = {276--291}, year = {2023}, url = {https://doi.org/10.1016/j.future.2022.12.042}, doi = {10.1016/J.FUTURE.2022.12.042}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/GowdaMML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/ZhangTWKW23, author = {Shuangshuang Zhang and Yue Tang and Dinghui Wang and Noorliza Karia and Chenguang Wang}, title = {Secured {SDN} Based Task Scheduling in Edge Computing for Smart City Health Monitoring Operation Management System}, journal = {J. Grid Comput.}, volume = {21}, number = {4}, pages = {71}, year = {2023}, url = {https://doi.org/10.1007/s10723-023-09707-5}, doi = {10.1007/S10723-023-09707-5}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/grid/ZhangTWKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LandwehrRWTJKK23, author = {Carl E. Landwehr and Michael K. Reiter and Laurie A. Williams and Gene Tsudik and Trent Jaeger and Tadayoshi Kohno and Apu Kapadia}, title = {Looking Backwards (and Forwards): {NSF} Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription}, journal = {{IEEE} Secur. Priv.}, volume = {21}, number = {2}, pages = {32--42}, year = {2023}, url = {https://doi.org/10.1109/MSEC.2022.3208721}, doi = {10.1109/MSEC.2022.3208721}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/LandwehrRWTJKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/JinLGWXL23, author = {Leisheng Jin and Zhuo Liu and Ai Guan and Zhen Wang and Rui Xue and Lijie Li}, title = {A high efficient next generation reservoir computing to predict and generate chaos with application for secure communication}, journal = {{IET} Commun.}, volume = {17}, number = {4}, pages = {489--496}, year = {2023}, url = {https://doi.org/10.1049/cmu2.12559}, doi = {10.1049/CMU2.12559}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/JinLGWXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/KodadaD23, author = {Basappa B. Kodada and Demian Antony D'Mello}, title = {{FSACE:} finite state automata-based client-side encryption for secure data deduplication in cloud computing}, journal = {Int. J. Cloud Comput.}, volume = {12}, number = {6}, pages = {531--555}, year = {2023}, url = {https://doi.org/10.1504/IJCC.2023.134644}, doi = {10.1504/IJCC.2023.134644}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/KodadaD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/DharminderM23, author = {Dharminder Dharminder and Dheerendra Mishra}, title = {{PSMECS:} {A} provably secure ID-based communication in mobile edge computing}, journal = {Int. J. Commun. Syst.}, volume = {36}, number = {12}, year = {2023}, url = {https://doi.org/10.1002/dac.4116}, doi = {10.1002/DAC.4116}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/DharminderM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/SutarMK23, author = {Swapnil Sutar and Priyanka Mekala and U. Surya Kameswari}, title = {Secured IoT node design through protected {ITULES} family group-II {(ULWC)} implementation against physical attacks for ubiquitous computing}, journal = {Int. J. Embed. Syst.}, volume = {16}, number = {4}, pages = {288--311}, year = {2023}, url = {https://doi.org/10.1504/IJES.2023.139205}, doi = {10.1504/IJES.2023.139205}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/SutarMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiei/YadavM23, author = {Monika Yadav and Atul Mishra}, title = {Secure task scheduling in cloud computing with enhanced ordinal optimisation and integrated DNA, Morse code techniques}, journal = {Int. J. Intell. Eng. Informatics}, volume = {11}, number = {2}, pages = {155--175}, year = {2023}, url = {https://doi.org/10.1504/IJIEI.2023.132700}, doi = {10.1504/IJIEI.2023.132700}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiei/YadavM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SamriyaKG23, author = {Jitendra Kumar Samriya and Mohit Kumar and Sukhpal Singh Gill}, title = {Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing}, journal = {Int. J. Netw. Manag.}, volume = {33}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/nem.2243}, doi = {10.1002/NEM.2243}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/SamriyaKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/SongLBZT23, author = {Wenjun Song and Mengqi Liu and Thar Baker and Qikun Zhang and Yu{-}an Tan}, title = {A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment}, journal = {Int. J. Netw. Manag.}, volume = {33}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/nem.2225}, doi = {10.1002/NEM.2225}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/SongLBZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/WangCLH23, author = {Xuguo Wang and Ligeng Chen and Yu Liang and Hao Huang}, title = {NISe: Non-Invasive Secure Framework for Multi-Access Edge Computing}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {33}, number = {9}, pages = {1467--1488}, year = {2023}, url = {https://doi.org/10.1142/S0218194023500390}, doi = {10.1142/S0218194023500390}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijseke/WangCLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informatics/BallhausenH23, author = {Hendrik Ballhausen and Ludwig Christian G. Hinske}, title = {Federated Secure Computing}, journal = {Informatics}, volume = {10}, number = {4}, pages = {83}, year = {2023}, url = {https://doi.org/10.3390/informatics10040083}, doi = {10.3390/INFORMATICS10040083}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informatics/BallhausenH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/MorabitoSRCC23, author = {Gabriele Morabito and Christian Sicari and Armando Ruggeri and Antonio Celesti and Lorenzo Carnevale}, title = {Secure-by-design serverless workflows on the Edge-Cloud Continuum through the Osmotic Computing paradigm}, journal = {Internet Things}, volume = {22}, pages = {100737}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100737}, doi = {10.1016/J.IOT.2023.100737}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iot/MorabitoSRCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iot/YaoGWY23, author = {Mengting Yao and Qingqing Gan and Xiaoming Wang and Yuhao Yang}, title = {A key-insulated secure multi-server authenticated key agreement protocol for edge computing-based VANETs}, journal = {Internet Things}, volume = {21}, pages = {100679}, year = {2023}, url = {https://doi.org/10.1016/j.iot.2023.100679}, doi = {10.1016/J.IOT.2023.100679}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iot/YaoGWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiLZ23, author = {Jiahao Li and Dongmei Li and Xiaomei Zhang}, title = {A Secure Blockchain-Assisted Access Control Scheme for Smart Healthcare System in Fog Computing}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {18}, pages = {15980--15989}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3268278}, doi = {10.1109/JIOT.2023.3268278}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MooreIRA23, author = {Ervin Moore and Ahmed Imteaj and Shabnam Rezapour and M. Hadi Amini}, title = {A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-Constrained Computing}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {24}, pages = {21942--21958}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3313055}, doi = {10.1109/JIOT.2023.3313055}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/MooreIRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SankaranSG23, author = {Ganesh Chennimala Sankaran and Krishna M. Sivalingam and Harsh Gondaliya}, title = {{P4} and NetFPGA-Based Secure In-Network Computing Architecture for AI-Enabled Industrial Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {4}, pages = {2979--2994}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2021.3125862}, doi = {10.1109/JIOT.2021.3125862}, timestamp = {Mon, 30 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/SankaranSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SinghCSK23, author = {Ashish Singh and Kakali Chatterjee and Anish Kumar Singh and Neeraj Kumar}, title = {Secure Smart Healthcare Framework Using Lightweight {DNA} Sequence and Chaos for Mobile-Edge Computing}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {6, March 15}, pages = {4883--4890}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3219113}, doi = {10.1109/JIOT.2022.3219113}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SinghCSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TianLLXZH23, author = {Wenlong Tian and Qi Liu and Ruixuan Li and Zhiyong Xu and Yan Zhang and Yongfeng Huang}, title = {A Blockchain-Based Secure Searching Strategy for Metadata in Mobile Edge Computing}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {22}, pages = {19795--19809}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3282043}, doi = {10.1109/JIOT.2023.3282043}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TianLLXZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuYZCG23, author = {Dongyang Xu and Keping Yu and Li Zhen and Kim{-}Kwang Raymond Choo and Mohsen Guizani}, title = {Quantum Learning on Structured Code With Computing Traps for Secure {URLLC} in Industrial IoT Scenarios}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {18}, pages = {16516--16530}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3268608}, doi = {10.1109/JIOT.2023.3268608}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/XuYZCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangWQLX23, author = {Yifang Zhang and Shengling Wang and Xidi Qu and Chunxiao Li and Enliang Xu}, title = {Toward Secure and Efficient Collaborative Cached Data Auditing for Distributed Fog Computing}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {23}, pages = {20941--20954}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3284345}, doi = {10.1109/JIOT.2023.3284345}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhangWQLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YaoWYLWJH23, author = {Lisha Yao and Jian Weng and Anjia Yang and Xiaojian Liang and Zhenghao Wu and Zike Jiang and Lin Hou}, title = {Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing}, journal = {Inf. Sci.}, volume = {624}, pages = {777--795}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2022.12.035}, doi = {10.1016/J.INS.2022.12.035}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/YaoWYLWJH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AliHHHY23, author = {Muqadar Ali and Hongjie He and Abid Hussain and Mehboob Hussain and Yuan Yuan}, title = {Efficient Secure Privacy Preserving Multi Keywords Rank Search over Encrypted Data in Cloud Computing}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103500}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103500}, doi = {10.1016/J.JISA.2023.103500}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AliHHHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChakrabortyKC23, author = {Ananya Chakraborty and Mohit Kumar and Nisha Chaurasia}, title = {Secure framework for IoT applications using Deep Learning in fog Computing}, journal = {J. Inf. Secur. Appl.}, volume = {77}, pages = {103569}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103569}, doi = {10.1016/J.JISA.2023.103569}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChakrabortyKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SaleemWI23, author = {Mahreen Saleem and M. R. Warsi and Saiful Islam}, title = {Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment}, journal = {J. Inf. Secur. Appl.}, volume = {72}, pages = {103389}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2022.103389}, doi = {10.1016/J.JISA.2022.103389}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SaleemWI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iswa/AjaoA23, author = {Lukman Adewale Ajao and Simon Tooswem Apeh}, title = {Secure edge computing vulnerabilities in smart cities sustainability using petri net and genetic algorithm-based reinforcement learning}, journal = {Intell. Syst. Appl.}, volume = {18}, pages = {200216}, year = {2023}, url = {https://doi.org/10.1016/j.iswa.2023.200216}, doi = {10.1016/J.ISWA.2023.200216}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iswa/AjaoA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itl/HammedA23, author = {Shahul Hammed and Balachandran Arunkumar}, title = {A cost effective- secure algorithm for work-flow scheduling in cloud computing}, journal = {Internet Technol. Lett.}, volume = {6}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/itl2.233}, doi = {10.1002/ITL2.233}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itl/HammedA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/SubbarajTR23, author = {Saroja Subbaraj and Revathi Thiyagarajan and Madavan Rengaraj}, title = {A smart fog computing based real-time secure resource allocation and scheduling strategy using multi-objective crow search algorithm}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {14}, number = {2}, pages = {1003--1015}, year = {2023}, url = {https://doi.org/10.1007/s12652-021-03354-y}, doi = {10.1007/S12652-021-03354-Y}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/SubbarajTR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/SuganyaS23, author = {M. Suganya and T. Sasipraba}, title = {Stochastic Gradient Descent long short-term memory based secure encryption algorithm for cloud data storage and retrieval in cloud computing environment}, journal = {J. Cloud Comput.}, volume = {12}, number = {1}, pages = {74}, year = {2023}, url = {https://doi.org/10.1186/s13677-023-00442-6}, doi = {10.1186/S13677-023-00442-6}, timestamp = {Thu, 18 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/SuganyaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/HsuWF23, author = {Ruei{-}Hau Hsu and Lu{-}Chin Wang and Hsiang{-}Shian Fan}, title = {Universally Secure Device-to-Device Communications with Privacy Protection and Fine-grained Access Control Based on 5G-enabled Multi-access Edge Computing}, journal = {J. Inf. Sci. Eng.}, volume = {39}, number = {3}, pages = {507--524}, year = {2023}, url = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=192\_2586}, timestamp = {Mon, 29 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/HsuWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AjwadAKJM23, author = {Asmaa Abbas Ajwad and Ammar Abdulrahman Ahmed and Muntaha Kamal and Refed Adnan Jaleel and Marium Basheer Mahmood}, title = {Improved Secure IoTs-Based Visual Computing with Image Processing and Artificial Intelligence Techniques for Accurate Predicting of Novel {COVID}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.001}, doi = {10.58346/JOWUA.2023.I1.001}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AjwadAKJM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LavanyaS23, author = {S. Lavanya and N. M. Saravanakumar}, title = {Secured two factor authentication, graph based replication and encryption strategy in cloud computing}, journal = {Multim. Tools Appl.}, volume = {82}, number = {11}, pages = {16105--16125}, year = {2023}, url = {https://doi.org/10.1007/s11042-022-13838-4}, doi = {10.1007/S11042-022-13838-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LavanyaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/FoxSXBMPC23, author = {Anthony C. J. Fox and Gareth Stockwell and Shale Xiong and Hanno Becker and Dominic P. Mulligan and Gustavo Petri and Nathan Chong}, title = {A Verification Methodology for the Arm{\textregistered} Confidential Computing Architecture: From a Secure Specification to Safe Implementations}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{OOPSLA1}}, pages = {376--405}, year = {2023}, url = {https://doi.org/10.1145/3586040}, doi = {10.1145/3586040}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/FoxSXBMPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/ChenXZCL23, author = {Xue Chen and Hongbo Xu and Guoping Zhang and Yun Chen and Ruijie Li}, title = {Secure computation offloading assisted by intelligent reflection surface for mobile edge computing network}, journal = {Phys. Commun.}, volume = {57}, pages = {102003}, year = {2023}, url = {https://doi.org/10.1016/j.phycom.2023.102003}, doi = {10.1016/J.PHYCOM.2023.102003}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/ChenXZCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/ZhangLMC23, author = {Yingzheng Zhang and Jufang Li and Guangchen Mu and Xiaoyu Chen}, title = {Deep reinforcement learning enabled UAV-IRS-assisted secure mobile edge computing network}, journal = {Phys. Commun.}, volume = {61}, pages = {102173}, year = {2023}, url = {https://doi.org/10.1016/j.phycom.2023.102173}, doi = {10.1016/J.PHYCOM.2023.102173}, timestamp = {Sat, 20 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/ZhangLMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/DwivediAV23, author = {Sanjeev Kumar Dwivedi and Ruhul Amin and Satyanarayana Vollala}, title = {Smart contract and IPFS-based trustworthy secure data storage and device authentication scheme in fog computing environment}, journal = {Peer Peer Netw. Appl.}, volume = {16}, number = {1}, pages = {1--21}, year = {2023}, url = {https://doi.org/10.1007/s12083-022-01376-7}, doi = {10.1007/S12083-022-01376-7}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/DwivediAV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Russinovich23, author = {Mark Russinovich}, title = {Confidential Computing: Elevating Cloud Security and Privacy: Working toward a more secure and innovative future}, journal = {{ACM} Queue}, volume = {21}, number = {4}, pages = {44--48}, year = {2023}, url = {https://doi.org/10.1145/3623461}, doi = {10.1145/3623461}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Russinovich23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/PulipetiK23, author = {Srikanth Pulipeti and Adarsh Kumar}, title = {Secure quantum computing for healthcare sector: {A} short analysis}, journal = {Secur. Priv.}, volume = {6}, number = {5}, year = {2023}, url = {https://doi.org/10.1002/spy2.293}, doi = {10.1002/SPY2.293}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/PulipetiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/Jiang23, author = {Hongwei Jiang}, title = {Secure Storage of Computer Network Data based on Cloud Computing}, journal = {Scalable Comput. Pract. Exp.}, volume = {24}, number = {4}, pages = {663--672}, year = {2023}, url = {https://doi.org/10.12694/scpe.v24i4.2069}, doi = {10.12694/SCPE.V24I4.2069}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scpe/Jiang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlharbiAAE23, author = {Hatem A. Alharbi and Mohammad Aldossary and Jaber Almutairi and Ibrahim A. Elgendy}, title = {Energy-Aware and Secure Task Offloading for Multi-Tier Edge-Cloud Computing Systems}, journal = {Sensors}, volume = {23}, number = {6}, pages = {3254}, year = {2023}, url = {https://doi.org/10.3390/s23063254}, doi = {10.3390/S23063254}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/AlharbiAAE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Roy23, author = {Deepsubhra Guha Roy}, title = {BlockEdge: {A} Privacy-Aware Secured Edge Computing Framework Using Blockchain for Industry 4.0}, journal = {Sensors}, volume = {23}, number = {5}, pages = {2502}, year = {2023}, url = {https://doi.org/10.3390/s23052502}, doi = {10.3390/S23052502}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Roy23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sis/ZengKS23, author = {Ying Zeng and Zhongmiao Kang and Zhan Shi}, title = {Secure Data Processing Technology of Distribution Network {OPGW} Line with Edge Computing}, journal = {{EAI} Endorsed Trans. Scalable Inf. Syst.}, volume = {10}, number = {3}, pages = {e7}, year = {2023}, url = {https://doi.org/10.4108/eetsis.v10i3.2837}, doi = {10.4108/EETSIS.V10I3.2837}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sis/ZengKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/GuptaSSL23, author = {Ishu Gupta and Deepika Saxena and Ashutosh Kumar Singh and Chung{-}Nan Lee}, title = {SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {4}, pages = {5130--5141}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3272611}, doi = {10.1109/JSYST.2023.3272611}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/GuptaSSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/BhattaraiP23, author = {Adarsha Bhattarai and Dongming Peng}, title = {An Integrated Secure Efficient Computing Architecture for Embedded and Remote {ECG} Diagnosis}, journal = {{SN} Comput. Sci.}, volume = {4}, number = {1}, pages = {45}, year = {2023}, url = {https://doi.org/10.1007/s42979-022-01465-7}, doi = {10.1007/S42979-022-01465-7}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sncs/BhattaraiP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/suscom/YadavS23, author = {Ashish Mohan Yadav and S. C. Sharma}, title = {Cooperative task scheduling secured with blockchain in sustainable mobile edge computing}, journal = {Sustain. Comput. Informatics Syst.}, volume = {37}, pages = {100843}, year = {2023}, url = {https://doi.org/10.1016/j.suscom.2022.100843}, doi = {10.1016/J.SUSCOM.2022.100843}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/suscom/YadavS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ZhangCZ23, author = {Ji Zhang and Anmin Chen and Ping Zhang}, title = {Provably Secure Data Access Control Protocol for Cloud Computing}, journal = {Symmetry}, volume = {15}, number = {12}, pages = {2111}, year = {2023}, url = {https://doi.org/10.3390/sym15122111}, doi = {10.3390/SYM15122111}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/ZhangCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/DuLLZ23, author = {Wei Du and Ang Li and Qinghua Li and Pan Zhou}, title = {Privacy-Preserving and Secure Cloud Computing: {A} Case of Large-Scale Nonlinear Programming}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {1}, pages = {484--498}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3099720}, doi = {10.1109/TCC.2021.3099720}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/DuLLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiuHLXLYX23, author = {Zewei Liu and Chunqiang Hu and Ruinian Li and Tao Xiang and Xingwang Li and Jiguo Yu and Hui Xia}, title = {A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {2325--2336}, year = {2023}, url = {https://doi.org/10.1109/TCC.2022.3201401}, doi = {10.1109/TCC.2022.3201401}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/LiuHLXLYX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiuZYLHLY23, author = {Yao Liu and Tanping Zhou and Zelun Yue and Wenchao Liu and Yiliang Han and Qi Li and Xiaoyuan Yang}, title = {Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {1}, pages = {564--578}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3103546}, doi = {10.1109/TCC.2021.3103546}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/LiuZYLHLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Rajsbaum23, author = {Sergio Rajsbaum}, title = {A distributed computing perspective of unconditionally secure information transmission in Russian cards problems}, journal = {Theor. Comput. Sci.}, volume = {952}, pages = {113761}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.113761}, doi = {10.1016/J.TCS.2023.113761}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/Rajsbaum23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLYXL23, author = {Lili Wang and Ye Lin and Ting Yao and Hu Xiong and Kaitai Liang}, title = {{FABRIC:} Fast and Secure Unbounded Cross-System Encrypted Data Sharing in Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {5130--5142}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2023.3240820}, doi = {10.1109/TDSC.2023.3240820}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WangLYXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SongMZXL23, author = {Zishuai Song and Hui Ma and Rui Zhang and Wenhan Xu and Jianhao Li}, title = {Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2234--2249}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3266164}, doi = {10.1109/TIFS.2023.3266164}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SongMZXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WazidDSRG23, author = {Mohammad Wazid and Ashok Kumar Das and Sachin Shetty and Joel J. P. C. Rodrigues and Mohsen Guizani}, title = {{AISCM-FH:} AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {319--334}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3220959}, doi = {10.1109/TIFS.2022.3220959}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WazidDSRG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWMLWWY23, author = {Zhuangzhuang Zhang and Libing Wu and Chuanguo Ma and Jianxin Li and Jing Wang and Qian Wang and Shui Yu}, title = {{LSFL:} {A} Lightweight and Secure Federated Learning Scheme for Edge Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {365--379}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2022.3221899}, doi = {10.1109/TIFS.2022.3221899}, timestamp = {Sat, 04 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWMLWWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhongWCZB23, author = {Hong Zhong and Li Wang and Jie Cui and Jing Zhang and Irina Bolodurina}, title = {Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3774--3786}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3287731}, doi = {10.1109/TIFS.2023.3287731}, timestamp = {Sat, 12 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhongWCZB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/WuZBW23, author = {Yirui Wu and Lilai Zhang and Stefano Berretti and Shaohua Wan}, title = {Medical Image Encryption by Content-Aware {DNA} Computing for Secure Healthcare}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {2}, pages = {2089--2098}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3194590}, doi = {10.1109/TII.2022.3194590}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/WuZBW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/JiangHLMZ23, author = {Bingcheng Jiang and Qian He and Peng Liu and Sabita Maharjan and Yan Zhang}, title = {Blockchain Empowered Secure Video Sharing With Access Control for Vehicular Edge Computing}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {9}, pages = {9041--9054}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3269058}, doi = {10.1109/TITS.2023.3269058}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/JiangHLMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/JuCCLPXODL23, author = {Ying Ju and Yuchao Chen and Zhiwei Cao and Lei Liu and Qingqi Pei and Ming Xiao and Kaoru Ota and Mianxiong Dong and Victor C. M. Leung}, title = {Joint Secure Offloading and Resource Allocation for Vehicular Edge Computing Network: {A} Multi-Agent Deep Reinforcement Learning Approach}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {5}, pages = {5555--5569}, year = {2023}, url = {https://doi.org/10.1109/TITS.2023.3242997}, doi = {10.1109/TITS.2023.3242997}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/JuCCLPXODL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tiv/LangTDZSL23, author = {Ping Lang and Daxin Tian and Xuting Duan and Jianshan Zhou and Zhengguo Sheng and Victor C. M. Leung}, title = {Blockchain-Based Cooperative Computation Offloading and Secure Handover in Vehicular Edge Computing Networks}, journal = {{IEEE} Trans. Intell. Veh.}, volume = {8}, number = {7}, pages = {3839--3853}, year = {2023}, url = {https://doi.org/10.1109/TIV.2023.3271367}, doi = {10.1109/TIV.2023.3271367}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tiv/LangTDZSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/AsheralievaN23, author = {Alia Asheralieva and Dusit Niyato}, title = {Secure and Efficient Coded Multi-Access Edge Computing With Generalized Graph Neural Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {9}, pages = {5504--5524}, year = {2023}, url = {https://doi.org/10.1109/TMC.2022.3172117}, doi = {10.1109/TMC.2022.3172117}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/AsheralievaN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/AsheralievaNX23, author = {Alia Asheralieva and Dusit Niyato and Zehui Xiong}, title = {Auction-and-Learning Based Lagrange Coded Computing Model for Privacy-Preserving, Secure, and Resilient Mobile Edge Computing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {2}, pages = {744--764}, year = {2023}, url = {https://doi.org/10.1109/TMC.2021.3097380}, doi = {10.1109/TMC.2021.3097380}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/AsheralievaNX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LiWCLL23, author = {Jiaxing Li and Jigang Wu and Long Chen and Jin Li and Siew{-}Kei Lam}, title = {Blockchain-Based Secure Key Management for Mobile Edge Computing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {1}, pages = {100--114}, year = {2023}, url = {https://doi.org/10.1109/TMC.2021.3068717}, doi = {10.1109/TMC.2021.3068717}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/LiWCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LuMFGZWN23, author = {Weidang Lu and Yandan Mo and Yunqi Feng and Yuan Gao and Nan Zhao and Yuan Wu and Arumugam Nallanathan}, title = {Secure Transmission for Multi-UAV-Assisted Mobile Edge Computing Based on Reinforcement Learning}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {3}, pages = {1270--1282}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3185130}, doi = {10.1109/TNSE.2022.3185130}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/LuMFGZWN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/TanveerKNAE23, author = {Muhammad Tanveer and Abd Ullah Khan and Tu N. Nguyen and Musheer Ahmad and Ahmed A. Abd El{-}Latif}, title = {Towards a Secure and Computational Framework for Internet of Drones Enabled Aerial Computing}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {10}, number = {5}, pages = {3058--3070}, year = {2023}, url = {https://doi.org/10.1109/TNSE.2022.3151843}, doi = {10.1109/TNSE.2022.3151843}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/TanveerKNAE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YuanHTLYCY23, author = {Liang Yuan and Qiang He and Siyu Tan and Bo Li and Jiangshan Yu and Feifei Chen and Yun Yang}, title = {CoopEdge+: Enabling Decentralized, Secure and Cooperative Multi-Access Edge Computing Based on Blockchain}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {34}, number = {3}, pages = {894--908}, year = {2023}, url = {https://doi.org/10.1109/TPDS.2022.3231296}, doi = {10.1109/TPDS.2022.3231296}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/YuanHTLYCY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/AlDoghmanMKSTZ23, author = {Firas Al{-}Doghman and Nour Moustafa and Ibrahim Khalil and Nasrin Sohrabi and Zahir Tari and Albert Y. Zomaya}, title = {AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {2}, pages = {1485--1504}, year = {2023}, url = {https://doi.org/10.1109/TSC.2022.3155447}, doi = {10.1109/TSC.2022.3155447}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/AlDoghmanMKSTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/HuangWC23, author = {Qinlong Huang and Chao Wang and Lixuan Chen}, title = {Secure and Fine-Grained Flow Control for Subscription-Based Data Services in Cloud-Edge Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {3}, pages = {2165--2177}, year = {2023}, url = {https://doi.org/10.1109/TSC.2022.3203378}, doi = {10.1109/TSC.2022.3203378}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/HuangWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/LiYFP23, author = {Hongjun Li and Jia Yu and Jianxi Fan and Yihai Pi}, title = {{DSOS:} {A} Distributed Secure Outsourcing System for Edge Computing Service in IoT}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {53}, number = {1}, pages = {238--250}, year = {2023}, url = {https://doi.org/10.1109/TSMC.2022.3179345}, doi = {10.1109/TSMC.2022.3179345}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/LiYFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/ChenWZLTD23, author = {Zhuojun Chen and Ming Wu and Yifeng Zhou and Renlong Li and Jinzhe Tan and Ding Ding}, title = {{PUF-CIM:} SRAM-Based Compute-In-Memory With Zero Bit-Error-Rate Physical Unclonable Function for Lightweight Secure Edge Computing}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {31}, number = {8}, pages = {1234--1247}, year = {2023}, url = {https://doi.org/10.1109/TVLSI.2023.3277517}, doi = {10.1109/TVLSI.2023.3277517}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/ChenWZLTD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WangSZMZ23, author = {Peng Wang and Wen Sun and Haibin Zhang and Wenqiang Ma and Yan Zhang}, title = {Distributed and Secure Federated Learning for Wireless Computing Power Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {7}, pages = {9381--9393}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3247859}, doi = {10.1109/TVT.2023.3247859}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WangSZMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WuSGL23, author = {Mengru Wu and Qingyang Song and Lei Guo and Inkyu Lee}, title = {Energy-Efficient Secure Computation Offloading in Wireless Powered Mobile Edge Computing Systems}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {5}, pages = {6907--6912}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3236327}, doi = {10.1109/TVT.2023.3236327}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WuSGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/XieCAPLH23, author = {Zhan Xie and Yong Chen and Ikram Ali and Chengwei Pan and Fagen Li and Wen He}, title = {Efficient and Secure Certificateless Signcryption Without Pairing for Edge Computing-Based Internet of Vehicles}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {5}, pages = {5642--5653}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3230442}, doi = {10.1109/TVT.2022.3230442}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/XieCAPLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/ChenLKSLG23, author = {Chien{-}Ming Chen and Zhen Li and Saru Kumari and Gautam Srivastava and Kuruva Lakshmanna and Thippa Reddy Gadekallu}, title = {A provably secure key transfer protocol for the fog-enabled Social Internet of Vehicles based on a confidential computing environment}, journal = {Veh. Commun.}, volume = {39}, pages = {100567}, year = {2023}, url = {https://doi.org/10.1016/j.vehcom.2022.100567}, doi = {10.1016/J.VEHCOM.2022.100567}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/ChenLKSLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wias/ReddyK23, author = {G. Narendrababu Reddy and S. Phani Kumar}, title = {Multi-objective secure aware workflow scheduling algorithm in cloud computing based on hybrid optimization algorithm}, journal = {Web Intell.}, volume = {21}, number = {4}, pages = {385--405}, year = {2023}, url = {https://doi.org/10.3233/WEB-220094}, doi = {10.3233/WEB-220094}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wias/ReddyK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/KavuriS23, author = {Satheesh K. S. V. A. Kavuri and T. Krishna Sree}, title = {Enhancing Security Using Secure Authentication Model in Fog Computing Model}, journal = {Wirel. Pers. Commun.}, volume = {130}, number = {2}, pages = {909--933}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10313-7}, doi = {10.1007/S11277-023-10313-7}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/KavuriS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/PadmaS23, author = {P. Padma and S. Srinivasan}, title = {DAuth - Delegated Authorization Framework for Secured Serverless Cloud Computing}, journal = {Wirel. Pers. Commun.}, volume = {129}, number = {3}, pages = {1563--1583}, year = {2023}, url = {https://doi.org/10.1007/s11277-023-10189-7}, doi = {10.1007/S11277-023-10189-7}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/PadmaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/ZhouDBZHK23, author = {Naweiluo Zhou and Florent Dufour and Vinzent Bode and Peter Zinterhof and Nicolay J. Hammer and Dieter Kranzlm{\"{u}}ller}, title = {Towards Confidential Computing: {A} Secure Cloud Architecture for Big Data Analytics and {AI}}, booktitle = {16th {IEEE} International Conference on Cloud Computing, {CLOUD} 2023, Chicago, IL, USA, July 2-8, 2023}, pages = {293--295}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CLOUD60044.2023.00042}, doi = {10.1109/CLOUD60044.2023.00042}, timestamp = {Fri, 29 Sep 2023 13:28:51 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcloud/ZhouDBZHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChenWLS23, author = {Chunlu Chen and Kevin I{-}Kai Wang and Peng Li and Kouichi Sakurai}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {{POSTER:} Advancing Federated Edge Computing with Continual Learning for Secure and Efficient Performance}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {685--689}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_40}, doi = {10.1007/978-3-031-41181-6\_40}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChenWLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiml2/NairRN23, author = {Renju C. Nair and Madhav Rao and Muralidhara V. N}, title = {SecureFrameNet: {A} rich computing capable secure framework for deploying neural network models on edge protected system}, booktitle = {Proceedings of the Third International Conference on {AI-ML} Systems, AIMLSystems 2023, Bangalore, India, October 25-28, 2023}, pages = {8:1--8:13}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3639856.3639864}, doi = {10.1145/3639856.3639864}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aiml2/NairRN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asss/HosenSPRC23, author = {A. S. M. Sanwar Hosen and Pradip Kumar Sharma and Deepak Puthal and In{-}Ho Ra and Gi Hwan Cho}, title = {SECBlock-IIoT: {A} Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things}, booktitle = {Proceedings of the Third International Symposium on Advanced Security on Software and Systems, {ASSS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {1:1--1:14}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591365.3592945}, doi = {10.1145/3591365.3592945}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asss/HosenSPRC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdsic/LinTTC23, author = {Han{-}Yu Lin and Tung{-}Tso Tsai and Pei{-}Yih Ting and Po{-}Cheng Chan}, title = {{CL-SML:} Secure Certificateless Signature with Message Linkages for IoT-Based Fog Computing Environments}, booktitle = {Proceedings of the 5th International Conference on Big-data Service and Intelligent Computation, {BDSIC} 2023, Singapore, October 20-22, 2023}, pages = {9--15}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3633624.3633626}, doi = {10.1145/3633624.3633626}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bdsic/LinTTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/Qiu023, author = {Houming Qiu and Kun Zhu}, editor = {Honghao Gao and Xinheng Wang and Nikolaos S. Voros}, title = {Secure and Private Approximated Coded Distributed Computing Using Elliptic Curve Cryptography}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 19th {EAI} International Conference, CollaborateCom 2023, Corfu Island, Greece, October 4-6, 2023, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {562}, pages = {357--374}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-54528-3\_20}, doi = {10.1007/978-3-031-54528-3\_20}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/colcom/Qiu023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsweek/GungorRA23, author = {Onat G{\"{u}}ng{\"{o}}r and Tajana Rosing and Baris Aksanli}, title = {Adversarial-HD: Hyperdimensional Computing Adversarial Attack Design for Secure Industrial Internet of Things}, booktitle = {Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, CPS-IoT Week 2023 Workshops, San Antonio, TX, USA, May 9-12, 2023}, pages = {1--6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576914.3587484}, doi = {10.1145/3576914.3587484}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpsweek/GungorRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/YuZAGAR23, author = {Xiaofan Yu and Minxuan Zhou and Fatemeh Asgarinejad and Onat G{\"{u}}ng{\"{o}}r and Baris Aksanli and Tajana Rosing}, title = {Lightning Talk: Private and Secure Edge {AI} with Hyperdimensional Computing}, booktitle = {60th {ACM/IEEE} Design Automation Conference, {DAC} 2023, San Francisco, CA, USA, July 9-13, 2023}, pages = {1--2}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DAC56929.2023.10247820}, doi = {10.1109/DAC56929.2023.10247820}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/YuZAGAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/BouamamaBO23, author = {Jaouhara Bouamama and Yahya Benkaouz and Mohammed Ouzzif}, title = {EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning in Edge Computing}, booktitle = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates, November 14-17, 2023}, pages = {375--382}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361333}, doi = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023.10361333}, timestamp = {Tue, 23 Jan 2024 20:30:56 +0100}, biburl = {https://dblp.org/rec/conf/dasc/BouamamaBO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dessert/BorgesAOD23, author = {Jos{\'{e}} Borges and Mirataei Alireza and Haidukevych Oleksandra and Nikolaos Doukas}, title = {A Secure Cloud Computing Method for Rapid Implementation of Cryptographic Data Protection in IoT}, booktitle = {13th International Conference on Dependable Systems, Services and Technologies, {DESSERT} 2023, Athens, Greece, October 13-15, 2023}, pages = {1--4}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DESSERT61349.2023.10416477}, doi = {10.1109/DESSERT61349.2023.10416477}, timestamp = {Sat, 24 Feb 2024 20:42:46 +0100}, biburl = {https://dblp.org/rec/conf/dessert/BorgesAOD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficta/SurendranTJPWJ23, author = {Priyanka Surendran and Bindhya Thomas and Densy John and Anupama Prasanth and Joy Winston and AbdulKhadar Jilani}, editor = {Vikrant Bhateja and Fiona Carroll and Jo{\~{a}}o Manuel R. S. Tavares and Sandeep Singh Sengar and Peter Peer}, title = {Authentication Protocol for Secure Data Access in Fog Computing-Based Internet of Things}, booktitle = {Intelligent Data Engineering and Analytics - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April 2023}, series = {Smart Innovation, Systems and Technologies}, volume = {371}, pages = {481--494}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-6706-3\_41}, doi = {10.1007/978-981-99-6706-3\_41}, timestamp = {Sun, 04 Aug 2024 19:42:19 +0200}, biburl = {https://dblp.org/rec/conf/ficta/SurendranTJPWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/AarellaMKP23, author = {Seema G. Aarella and Saraju P. Mohanty and Elias Kougianos and Deepak Puthal}, editor = {Himanshu Thapliyal and Ronald F. DeMara and Inna Partin{-}Vaisband and Srinivas Katkoori}, title = {Fortified-Edge: Secure {PUF} Certificate Authentication Mechanism for Edge Data Centers in Collaborative Edge Computing}, booktitle = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI} 2023, Knoxville, TN, USA, June 5-7, 2023}, pages = {249--254}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3583781.3590249}, doi = {10.1145/3583781.3590249}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/AarellaMKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaice/LiuZT23, author = {Guoying Liu and Xu Zeng and Zhifeng Tian}, title = {Terminal-Cloud Computing Power Collaboration Secure Surveillance System in Indoor Environments}, booktitle = {Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, {ICAICE} 2023, Dalian, China, November 17-19, 2023}, pages = {892--896}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3652628.3652777}, doi = {10.1145/3652628.3652777}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaice/LiuZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SinghKH23, author = {Parminder Singh and Avinash Kaur and Mustapha Hedabou}, title = {Blockchain and Dew Computing-based Model for Secure Energy Trading in Smart Grids}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2023 - Workshops, Rome, Italy, May 28 - June 1, 2023}, pages = {176--181}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCWorkshops57953.2023.10283767}, doi = {10.1109/ICCWORKSHOPS57953.2023.10283767}, timestamp = {Thu, 02 Nov 2023 17:09:45 +0100}, biburl = {https://dblp.org/rec/conf/icc/SinghKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/QinNWXL23, author = {Xiaofei Qin and Zhenyu Na and Xu Wu and Mudi Xiong and Bin Lin}, title = {Secure Mobile Edge Computing for Integrated {HAP} and {UAV} Networks}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2023, Dalian, China, August 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCC57788.2023.10233325}, doi = {10.1109/ICCC57788.2023.10233325}, timestamp = {Wed, 13 Sep 2023 08:43:35 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/QinNWXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/WangZL23, author = {Ying Wang and Yi Zheng and Jiahui Liu}, title = {Secure Task Offloading and Resource Scheduling in Maritime Edge Computing Systems}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2023, Dalian, China, August 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCC57788.2023.10233531}, doi = {10.1109/ICCC57788.2023.10233531}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/WangZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/WuCLQ23, author = {Mengru Wu and Weijin Chen and Kexin Li and Li Ping Qian}, title = {Secure Computation Offloading for IRS-Assisted Mobile Edge Computing Networks}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2023, Dalian, China, August 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCC57788.2023.10233499}, doi = {10.1109/ICCC57788.2023.10233499}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/WuCLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/NaazJS23, author = {Zaineb Naaz and Gamini Joshi and Vidushi Sharma}, title = {Secure and Efficient Edge Computing Framework For IoT}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--5}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10307200}, doi = {10.1109/ICCCNT56998.2023.10307200}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/NaazJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/SharmaM23, author = {Rohan Sharma and Swapna Mele Pottaraikkal}, title = {Unified Multi-Layered Model To Secure Computing Environments Against Cryptomining Malware}, booktitle = {14th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCCNT56998.2023.10306578}, doi = {10.1109/ICCCNT56998.2023.10306578}, timestamp = {Mon, 25 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/SharmaM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/MallahLH23, author = {Ranwa Al Mallah and David L{\'{o}}pez and Talal Halabi}, title = {Blockchain-enabled Efficient and Secure Federated Learning in IoT and Edge Computing Networks}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2023, Honolulu, HI, USA, February 20-22, 2023}, pages = {511--515}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICNC57223.2023.10074277}, doi = {10.1109/ICNC57223.2023.10074277}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccnc/MallahLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/Li23, author = {Wen Li}, title = {Trustless Layer for Secure Fog Computing}, booktitle = {Proceedings of the 8th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September 22-24, 2023}, pages = {328--334}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3617184.3630157}, doi = {10.1145/3617184.3630157}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icct/WuJ0G23, author = {Jian Wu and Min Jia and Qing Guo and Xuemai Gu}, title = {Joint Optimization of Computation Offloading and Power Allocation Based on {DRL} in Secure {LEO} Satellite Edge Computing System}, booktitle = {23rd {IEEE} International Conference on Communication Technology, {ICCT} 2023, Wuxi, China, October 20-22, 2023}, pages = {1668--1671}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCT59356.2023.10419561}, doi = {10.1109/ICCT59356.2023.10419561}, timestamp = {Wed, 28 Feb 2024 16:50:10 +0100}, biburl = {https://dblp.org/rec/conf/icct/WuJ0G23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icimmi/Sethi0G23, author = {Inderjeet Singh Sethi and Manish Shrivastava and Dinesh Goyal}, editor = {Dinesh Goyal and Anil Kumar and Dharm Singh and Marcin Paprzycki and Pooja Jain and B. B. Gupta and Uday Pratap Singh}, title = {Implementation of cloud computing towards Secure Online Auction for sustainable future of business}, booktitle = {Proceedings of the 5th International Conference on Information Management {\&} Machine Intelligence, Jaipur, India, November 23-25, 2023}, pages = {124:1--124:6}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3647444.3647951}, doi = {10.1145/3647444.3647951}, timestamp = {Fri, 17 May 2024 16:58:38 +0200}, biburl = {https://dblp.org/rec/conf/icimmi/Sethi0G23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SethiAB23, author = {Kamalakanta Sethi and Aniket Agrawal and Padmalochan Bera}, editor = {Vallipuram Muthukkumarasamy and Sithu D. Sudarsan and Rudrapatna K. Shyamasundar}, title = {Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology}, booktitle = {Information Systems Security - 19th International Conference, {ICISS} 2023, Raipur, India, December 16-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {431--448}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49099-6\_26}, doi = {10.1007/978-3-031-49099-6\_26}, timestamp = {Thu, 04 Jan 2024 08:13:46 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SethiAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icit2/ZhouSMH23, author = {Yuan Zhou and Haijian Sun and Xiang Ma and Rose Qingyang Hu}, title = {Energy-Efficient Secure Offloading for NOMA-Enabled Machine-type Mobile-Edge Computing}, booktitle = {{IEEE} International Conference on Industrial Technology, {ICIT} 2023, Orlando, FL, USA, April 4-6, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICIT58465.2023.10143151}, doi = {10.1109/ICIT58465.2023.10143151}, timestamp = {Fri, 23 Jun 2023 22:32:18 +0200}, biburl = {https://dblp.org/rec/conf/icit2/ZhouSMH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmip/LiL23, author = {Sijie Li and Xiehua Li}, title = {Secure Image Retrieval Based on Deep Learning in Cloud Computing}, booktitle = {Proceedings of the 2023 8th International Conference on Multimedia and Image Processing, {ICMIP} 2023, Tianjin, China, April 21-23, 2023}, pages = {40--46}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3599589.3599596}, doi = {10.1145/3599589.3599596}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icmip/LiL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/JiangZTXZD23, author = {Xutong Jiang and Guoming Zhang and Hao Tian and Haolong Xiang and Xuyun Zhang and Wanchun Dou}, title = {A Blockchain-enabled Secure Access Management Method in Edge Computing}, booktitle = {29th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2023, Ocean Flower Island, China, December 17-21, 2023}, pages = {2596--2603}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICPADS60453.2023.00345}, doi = {10.1109/ICPADS60453.2023.00345}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icpads/JiangZTXZD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icphys/JiaN23, author = {Jing Jia and Hiroaki Nishi}, title = {Differential Privacy Framework using Secure Computing on Untrusted Servers}, booktitle = {6th {IEEE} International Conference on Industrial Cyber-Physical Systems, {ICPS} 2023, Wuhan, China, May 8-11, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICPS58381.2023.10128028}, doi = {10.1109/ICPS58381.2023.10128028}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icphys/JiaN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifipiot/Nithin23, author = {G. Naga Nithin}, editor = {Deepak Puthal and Saraju P. Mohanty and Baek{-}Young Choi}, title = {An Efficient and Secure Mechanism for Ubiquitous Sustainable Computing System}, booktitle = {Internet of Things. Advances in Information and Communication Technology - 6th {IFIP} International Cross-Domain Conference, IFIPIoT 2023, Denton, TX, USA, November 2-3, 2023, Proceedings, Part {II}}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {684}, pages = {160--175}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45882-8\_12}, doi = {10.1007/978-3-031-45882-8\_12}, timestamp = {Tue, 30 Jan 2024 10:11:54 +0100}, biburl = {https://dblp.org/rec/conf/ifipiot/Nithin23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwcmc/BenMbarakNE23, author = {Omessead BenMbarak and Anis Naanaa and Sadok ElAsmi}, title = {New secure access control model for cloud computing based on Chaotic systems}, booktitle = {International Wireless Communications and Mobile Computing, {IWCMC} 2023, Marrakesh, Morocco, June 19-23, 2023}, pages = {1485--1490}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IWCMC58020.2023.10183120}, doi = {10.1109/IWCMC58020.2023.10183120}, timestamp = {Thu, 27 Jul 2023 08:33:40 +0200}, biburl = {https://dblp.org/rec/conf/iwcmc/BenMbarakNE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paap/LuCFLL23, author = {Zhixun Lu and Yanfeng Chen and Qihua Feng and Jing Liang and Peiya Li}, title = {End-to-End Secure Image Retrieval via Self-Supervised Learning in Cloud Computing}, booktitle = {14th {IEEE} International Symposium on Parallel Architectures, Algorithms and Programming, {PAAP} 2023, Beijing, China, November 24-26, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/PAAP60200.2023.10391596}, doi = {10.1109/PAAP60200.2023.10391596}, timestamp = {Tue, 13 Feb 2024 08:58:01 +0100}, biburl = {https://dblp.org/rec/conf/paap/LuCFLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/profes/DUrbanoCC23, author = {Andrea D'Urbano and Christian Catalano and Angelo Corallo}, editor = {Regine Kadgien and Andreas Jedlitschka and Andrea Janes and Valentina Lenarduzzi and Xiaozhou Li}, title = {A Perspective on the Interplay Between 5G and Quantum Computing for Secure Algorithm and Software Engineering}, booktitle = {Product-Focused Software Process Improvement - 24th International Conference, {PROFES} 2023, Dornbirn, Austria, December 10-13, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14484}, pages = {89--96}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49269-3\_9}, doi = {10.1007/978-3-031-49269-3\_9}, timestamp = {Sat, 09 Dec 2023 19:23:44 +0100}, biburl = {https://dblp.org/rec/conf/profes/DUrbanoCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/KornarosBG23, author = {George Kornaros and Georgia Berki and Miltos D. Grammatikakis}, editor = {Norbert Meyer and Anna Grocholewska{-}Czurylo}, title = {Quantum-Secure Communication for Trusted Edge Computing with IoT Devices}, booktitle = {{ICT} Systems Security and Privacy Protection - 38th {IFIP} {TC} 11 International Conference, {SEC} 2023, Poznan, Poland, June 14-16, 2023, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {679}, pages = {163--176}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56326-3\_12}, doi = {10.1007/978-3-031-56326-3\_12}, timestamp = {Fri, 17 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/KornarosBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcomp/CicconettiCLNPPS23, author = {Claudio Cicconetti and Marco Conti and Eufemia Lella and Pietro Noviello and Gennaro Davide Paduanelli and Andrea Passarella and Elisabetta Storelli}, title = {A Prototype for QKD-secure Serverless Computing with {ETSI} {MEC}}, booktitle = {2023 {IEEE} International Conference on Smart Computing, {SMARTCOMP} 2023, Nashville, TN, USA, June 26-30, 2023}, pages = {189--190}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SMARTCOMP58114.2023.00043}, doi = {10.1109/SMARTCOMP58114.2023.00043}, timestamp = {Tue, 15 Aug 2023 09:17:51 +0200}, biburl = {https://dblp.org/rec/conf/smartcomp/CicconettiCLNPPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/WangFYLCL23, author = {Jingjing Wang and Hao Feng and Zheng Yu and Rongtao Liao and Shi Chen and Ting Liang}, editor = {Budi Arief and Anna Monreale and Michael Sirivianos and Shujun Li}, title = {Secure and Efficient Data Processing for Cloud Computing with Fine-Grained Access Control}, booktitle = {Security and Privacy in Social Networks and Big Data - 9th International Symposium, SocialSec 2023, Canterbury, UK, August 14-16, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14097}, pages = {187--202}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-5177-2\_11}, doi = {10.1007/978-981-99-5177-2\_11}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/socialsec/WangFYLCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wicon/FuLYYPSF23, author = {Jinrong Fu and Yiwen Liu and Haobo Yan and Yahui Yang and Ling Peng and Yuanquan Shi and Tao Feng}, editor = {Leandros A. Maglaras and Christos Douligeris}, title = {Research on Highly Secure Metaverse Based on Extended Reality Under Edge Computing}, booktitle = {Wireless Internet - 16th {EAI} International Conference, WiCON 2023, Athens, Greece, December 15-16, 2023, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {527}, pages = {173--186}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-58053-6\_12}, doi = {10.1007/978-3-031-58053-6\_12}, timestamp = {Fri, 24 May 2024 16:16:17 +0200}, biburl = {https://dblp.org/rec/conf/wicon/FuLYYPSF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/23/PatilPBKKR23, author = {Rachana Yogesh Patil and Yogesh H. Patil and Aparna Bannore and Arijit Karati and Renu Kachhoriya and Manjiri Ranjanikar}, editor = {Kevin Daimi and Abeer Alsadoon and Cathryn Peoples and Nour El Madhoun}, title = {A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing Environment}, booktitle = {Emerging Trends in Cybersecurity Applications}, pages = {277--299}, publisher = {Springer International Publishing}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-09640-2\_13}, doi = {10.1007/978-3-031-09640-2\_13}, timestamp = {Wed, 04 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/23/PatilPBKKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dasc/2023, title = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates, November 14-17, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023}, doi = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023}, isbn = {979-8-3503-0460-2}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2023, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023, Tampa, FL, USA, November 7-9, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/DSC61021.2023}, doi = {10.1109/DSC61021.2023}, isbn = {979-8-3503-8211-2}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ladc/2023, title = {12th Latin-American Symposium on Dependable and Secure Computing, {LADC} 2023, La Paz, Bolivia, October 16-18, 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3615366}, doi = {10.1145/3615366}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ladc/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09913, author = {Tayyebeh Jahani{-}Nezhad and Mohammad Ali Maddah{-}Ali and Giuseppe Caire}, title = {Byzantine-Resistant Secure Aggregation for Federated Learning Based on Coded Computing and Vector Commitment}, journal = {CoRR}, volume = {abs/2302.09913}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09913}, doi = {10.48550/ARXIV.2302.09913}, eprinttype = {arXiv}, eprint = {2302.09913}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09913.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-13258, author = {Rongxin Xu and Shiva Raj Pokhrel and Qiujun Lan and Gang Li}, title = {Post Quantum Secure Blockchain-based Federated Learning for Mobile Edge Computing}, journal = {CoRR}, volume = {abs/2302.13258}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.13258}, doi = {10.48550/ARXIV.2302.13258}, eprinttype = {arXiv}, eprint = {2302.13258}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-13258.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-13727, author = {Ervin Moore and Ahmed Imteaj and Shabnam Rezapour and M. Hadi Amini}, title = {A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing}, journal = {CoRR}, volume = {abs/2303.13727}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.13727}, doi = {10.48550/ARXIV.2303.13727}, eprinttype = {arXiv}, eprint = {2303.13727}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-13727.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-17761, author = {Naweiluo Zhou and Florent Dufour and Vinzent Bode and Peter Zinterhof and Nicolay J. Hammer and Dieter Kranzlm{\"{u}}ller}, title = {Towards Confidential Computing: {A} Secure Cloud Architecture for Big Data Analytics and {AI}}, journal = {CoRR}, volume = {abs/2305.17761}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.17761}, doi = {10.48550/ARXIV.2305.17761}, eprinttype = {arXiv}, eprint = {2305.17761}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-17761.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-04564, author = {Ivan Damg{\aa}rd and Hannah Keller and Boel Nelson and Claudio Orlandi and Rasmus Pagh}, title = {Differentially Private Selection from Secure Distributed Computing}, journal = {CoRR}, volume = {abs/2306.04564}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.04564}, doi = {10.48550/ARXIV.2306.04564}, eprinttype = {arXiv}, eprint = {2306.04564}, timestamp = {Tue, 13 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-04564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-00623, author = {Patrick McDaniel and Farinaz Koushanfar}, title = {Secure and Trustworthy Computing 2.0 Vision Statement}, journal = {CoRR}, volume = {abs/2308.00623}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.00623}, doi = {10.48550/ARXIV.2308.00623}, eprinttype = {arXiv}, eprint = {2308.00623}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-00623.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-12624, author = {Chenxingyu Zhao and Yulin Sun and Ying Xiong and Arvind Krishnamurthy}, title = {Quark: {A} High-Performance Secure Container Runtime for Serverless Computing}, journal = {CoRR}, volume = {abs/2309.12624}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.12624}, doi = {10.48550/ARXIV.2309.12624}, eprinttype = {arXiv}, eprint = {2309.12624}, timestamp = {Mon, 16 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-12624.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-08701, author = {Trung{-}Hieu Hoang and Jordan D. Fuhrman and Ravi K. Madduri and Miao Li and Pranshu Chaturvedi and Zilinghan Li and Kibaek Kim and Minseok Ryu and Ryan Chard and Eliu A. Huerta and Maryellen L. Giger}, title = {Enabling End-to-End Secure Federated Learning in Biomedical Research on Heterogeneous Computing Environments with APPFLx}, journal = {CoRR}, volume = {abs/2312.08701}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.08701}, doi = {10.48550/ARXIV.2312.08701}, eprinttype = {arXiv}, eprint = {2312.08701}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-08701.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardKNOP23, author = {Ivan Damg{\aa}rd and Hannah Keller and Boel Nelson and Claudio Orlandi and Rasmus Pagh}, title = {Differentially Private Selection from Secure Distributed Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {894}, year = {2023}, url = {https://eprint.iacr.org/2023/894}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardKNOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Stapf22, author = {Emmanuel Stapf}, title = {System Architecture Designs for Secure, Flexible and Openly-Accessible Enclave Computing}, school = {Technical University of Darmstadt, Germany}, year = {2022}, url = {http://tuprints.ulb.tu-darmstadt.de/21487/}, urn = {urn:nbn:de:tuda-tuprints-214879}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Stapf22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Madi22, author = {Abbass Madi}, title = {Secure Machine Learning by means of Homomorphic Encryption and Verifiable Computing. (Apprentissage machine s{\'{e}}curis{\'{e}} {\`{a}} l'aide de chiffrement homomorphe et de calcul v{\'{e}}rifiable)}, school = {University of Paris-Saclay, France}, year = {2022}, url = {https://tel.archives-ouvertes.fr/tel-03629984}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Madi22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AhmedAIAAH22, author = {Adeel Ahmed and Saima Abdullah and Saman Iftikhar and Israr Ahmad and Siddiqa Ajmal and Qamar Hussain}, title = {A Novel Blockchain Based Secured and QoS Aware IoT Vehicular Network in Edge Cloud Computing}, journal = {{IEEE} Access}, volume = {10}, pages = {77707--77722}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3192111}, doi = {10.1109/ACCESS.2022.3192111}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AhmedAIAAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/IwamuraK22a, author = {Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal}, title = {TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server}, journal = {{IEEE} Access}, volume = {10}, pages = {120503--120513}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3222312}, doi = {10.1109/ACCESS.2022.3222312}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/IwamuraK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KimLOKPPP22, author = {MyeongHyun Kim and JoonYoung Lee and Ji{-}Hyeon Oh and Deok Kyu Kwon and Kisung Park and Youngho Park and Kil{-}Houm Park}, title = {A Secure Batch Authentication Scheme for Multiaccess Edge Computing in 5G-Enabled Intelligent Transportation System}, journal = {{IEEE} Access}, volume = {10}, pages = {96224--96238}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3205001}, doi = {10.1109/ACCESS.2022.3205001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KimLOKPPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MichailidisMSVS22, author = {Emmanouel T. Michailidis and Konstantinos Maliatsos and Dimitrios N. Skoutas and Demosthenes Vouyioukas and Charalabos Skianis}, title = {Secure UAV-Aided Mobile Edge Computing for IoT: {A} Review}, journal = {{IEEE} Access}, volume = {10}, pages = {86353--86383}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3199408}, doi = {10.1109/ACCESS.2022.3199408}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MichailidisMSVS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/array/BrennaSJJ22, author = {Lars Brenna and Isak Sunde Singh and H{\aa}vard Dagenborg Johansen and Dag Johansen}, title = {TFHE-rs: {A} library for safe and secure remote computing using fully homomorphic encryption and trusted execution environments}, journal = {Array}, volume = {13}, pages = {100118}, year = {2022}, url = {https://doi.org/10.1016/j.array.2021.100118}, doi = {10.1016/J.ARRAY.2021.100118}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/array/BrennaSJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/JabbarpourSSZ22, author = {Mohammad Reza Jabbarpour and Sheyda SeyedFarshi and Mehdi Sookhak and Albert Y. Zomaya}, title = {Proposing a Secure Self-Fining Vehicle Using Blockchain and Vehicular Edge Computing}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {11}, number = {2}, pages = {28--35}, year = {2022}, url = {https://doi.org/10.1109/MCE.2020.3038029}, doi = {10.1109/MCE.2020.3038029}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/JabbarpourSSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/SedjelmaciSAB22, author = {Hichem Sedjelmaci and Sidi{-}Mohammed Senouci and Nirwan Ansari and Abdelwahab Boualouache}, title = {A Trusted Hybrid Learning Approach to Secure Edge Computing}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {11}, number = {3}, pages = {30--37}, year = {2022}, url = {https://doi.org/10.1109/MCE.2021.3099634}, doi = {10.1109/MCE.2021.3099634}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/SedjelmaciSAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/YangT22, author = {Wu Yang and Himanshu Thapliyal}, title = {Approximate Adiabatic Logic for Low-Power and Secure Edge Computing}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {11}, number = {1}, pages = {88--94}, year = {2022}, url = {https://doi.org/10.1109/MCE.2021.3053908}, doi = {10.1109/MCE.2021.3053908}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cem/YangT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/PengCL22, author = {Bo Peng and Mingmin Chi and Chao Liu}, title = {Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing}, journal = {Sci. China Inf. Sci.}, volume = {65}, number = {7}, pages = {1--16}, year = {2022}, url = {https://doi.org/10.1007/s11432-021-3423-9}, doi = {10.1007/S11432-021-3423-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/PengCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/AliLBR22, author = {Hafiz Munsub Ali and Jun Liu and Syed Ahmad Chan Bukhari and Hafiz Tayyab Rauf}, title = {Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare}, journal = {Clust. Comput.}, volume = {25}, number = {3}, pages = {2143--2161}, year = {2022}, url = {https://doi.org/10.1007/s10586-021-03389-y}, doi = {10.1007/S10586-021-03389-Y}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/AliLBR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SaidiNA22, author = {Ahmed Saidi and Omar Nouali and Abdelouahab Amira}, title = {{SHARE-ABE:} an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing}, journal = {Clust. Comput.}, volume = {25}, number = {1}, pages = {167--185}, year = {2022}, url = {https://doi.org/10.1007/s10586-021-03382-5}, doi = {10.1007/S10586-021-03382-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/SaidiNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/WuSLY22, author = {Zhiwei Wu and Runhua Shi and Kunchang Li and Yifan Yang}, title = {Attribute-based data access control scheme with secure revocation in fog computing for smart grid}, journal = {Clust. Comput.}, volume = {25}, number = {6}, pages = {3899--3913}, year = {2022}, url = {https://doi.org/10.1007/s10586-022-03616-0}, doi = {10.1007/S10586-022-03616-0}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/WuSLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AkramMLSLC22, author = {Waseem Akram and Khalid Mahmood and Xiong Li and Mazhar Sadiq and Zhihan Lv and Shehzad Ashraf Chaudhry}, title = {An energy-efficient and secure identity based {RFID} authentication scheme for vehicular cloud computing}, journal = {Comput. Networks}, volume = {217}, pages = {109335}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.109335}, doi = {10.1016/J.COMNET.2022.109335}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AkramMLSLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/OgundoyinK22, author = {Sunday Oyinlola Ogundoyin and Ismaila Adeniyi Kamil}, title = {Secure and privacy-preserving {D2D} communication in fog computing services}, journal = {Comput. Networks}, volume = {210}, pages = {108942}, year = {2022}, url = {https://doi.org/10.1016/j.comnet.2022.108942}, doi = {10.1016/J.COMNET.2022.108942}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/OgundoyinK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PoongodiBAMSAH22, author = {M. Poongodi and Sami Bourouis and Ahmed Najat Ahmed and Vijayaragavan M. and Venkatesan K. G. S. and Wajdi Alhakami and Mounir Hamdi}, title = {A Novel Secured Multi-Access Edge Computing based {VANET} with Neuro fuzzy systems based Blockchain Framework}, journal = {Comput. Commun.}, volume = {192}, pages = {48--56}, year = {2022}, url = {https://doi.org/10.1016/j.comcom.2022.05.014}, doi = {10.1016/J.COMCOM.2022.05.014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/PoongodiBAMSAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LinMZZ22, author = {Yu Lin and Yunlong Mao and Yuan Zhang and Sheng Zhong}, title = {Secure deduplication schemes for content delivery in mobile edge computing}, journal = {Comput. Secur.}, volume = {114}, pages = {102602}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102602}, doi = {10.1016/J.COSE.2022.102602}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LinMZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/AfzaliPS22, author = {Mahboubeh Afzali and Hamid Pourmohammadi and Amin Mohammad Vali Samani}, title = {An efficient framework for trust evaluation of secure service selection in fog computing based on QoS, reputation, and social criteria}, journal = {Computing}, volume = {104}, number = {7}, pages = {1643--1675}, year = {2022}, url = {https://doi.org/10.1007/s00607-022-01053-w}, doi = {10.1007/S00607-022-01053-W}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/AfzaliPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/MahmoodSSZSN22, author = {Adnan Mahmood and Sarah Ali Siddiqui and Quan Z. Sheng and Wei Emma Zhang and Hajime Suzuki and Wei Ni}, title = {Trust on wheels: Towards secure and resource efficient IoV networks}, journal = {Computing}, volume = {104}, number = {6}, pages = {1337--1358}, year = {2022}, url = {https://doi.org/10.1007/s00607-021-01040-7}, doi = {10.1007/S00607-021-01040-7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/MahmoodSSZSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/ShuklaP22, author = {Shivangi Shukla and Sankita J. Patel}, title = {A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing}, journal = {Computing}, volume = {104}, number = {5}, pages = {1173--1202}, year = {2022}, url = {https://doi.org/10.1007/s00607-021-01041-6}, doi = {10.1007/S00607-021-01041-6}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/ShuklaP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/SinghABBSVJ22, author = {Maninderpal Singh and Gagangeet Singh Aujla and Rasmeet Singh Bali and Ranbir Singh Batth and Amritpal Singh and Sahil Vashisht and Anish Jindal}, title = {CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics}, journal = {Computing}, volume = {104}, number = {7}, pages = {1589--1613}, year = {2022}, url = {https://doi.org/10.1007/s00607-022-01064-7}, doi = {10.1007/S00607-022-01064-7}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/SinghABBSVJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/connection/WuHZW22, author = {Zeng Wu and Hui Huang and Yuping Zhou and Chenhuang Wu}, title = {A secure and efficient data deduplication framework for the internet of things via edge computing and blockchain}, journal = {Connect. Sci.}, volume = {34}, number = {1}, pages = {1999--2025}, year = {2022}, url = {https://doi.org/10.1080/09540091.2022.2090514}, doi = {10.1080/09540091.2022.2090514}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/connection/WuHZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiuZJZZR22, author = {Dengzhi Liu and Yong Zhang and Dongbao Jia and Qiaosheng Zhang and Xuefeng Zhao and Huan Rong}, title = {Toward secure distributed data storage with error locating in blockchain enabled edge computing}, journal = {Comput. Stand. Interfaces}, volume = {79}, pages = {103560}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103560}, doi = {10.1016/J.CSI.2021.103560}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LiuZJZZR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WuWSYJYW22, author = {Yulin Wu and Xuan Wang and Willy Susilo and Guomin Yang and Zoe Lin Jiang and Siu{-}Ming Yiu and Hao Wang}, title = {Generic server-aided secure multi-party computation in cloud computing}, journal = {Comput. Stand. Interfaces}, volume = {79}, pages = {103552}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103552}, doi = {10.1016/J.CSI.2021.103552}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/WuWSYJYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/AhamedN22, author = {N. Niyaz Ahamed and Duraipandian N}, title = {Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography}, journal = {Comput. Syst. Sci. Eng.}, volume = {41}, number = {1}, pages = {83--94}, year = {2022}, url = {https://doi.org/10.32604/csse.2022.020071}, doi = {10.32604/CSSE.2022.020071}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/AhamedN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/JinLL22, author = {Leisheng Jin and Zhuo Liu and Lijie Li}, title = {Chain-structure time-delay reservoir computing for synchronizing chaotic signal and an application to secure communication}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2022}, number = {1}, pages = {68}, year = {2022}, url = {https://doi.org/10.1186/s13634-022-00893-0}, doi = {10.1186/S13634-022-00893-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejasp/JinLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ChenLZLRYL22, author = {Miaojiang Chen and Wei Liu and Ning Zhang and Junling Li and Yingying Ren and Meng Yi and Anfeng Liu}, title = {{GPDS:} {A} multi-agent deep reinforcement learning game for anti-jamming secure computing in {MEC} network}, journal = {Expert Syst. Appl.}, volume = {210}, pages = {118394}, year = {2022}, url = {https://doi.org/10.1016/j.eswa.2022.118394}, doi = {10.1016/J.ESWA.2022.118394}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/ChenLZLRYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/AliKAJ22, author = {Ahmad Ali and Abid Khan and Mansoor Ahmed and Gwanggil Jeon}, title = {{BCALS:} Blockchain-based secure log management system for cloud computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {4}, year = {2022}, url = {https://doi.org/10.1002/ett.4272}, doi = {10.1002/ETT.4272}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/AliKAJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/VaanchigQR22, author = {Nyamsuren Vaanchig and Zhiguang Qin and Batjargal Ragchaasuren}, title = {Constructing secure-channel free identity-based encryption with equality test for vehicle-data sharing in cloud computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/ett.3896}, doi = {10.1002/ETT.3896}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/VaanchigQR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/BaiFY22, author = {Tianyu Bai and Song Fu and Qing Yang}, title = {Privacy-Preserving Object Detection with Secure Convolutional Neural Networks for Vehicular Edge Computing}, journal = {Future Internet}, volume = {14}, number = {11}, pages = {316}, year = {2022}, url = {https://doi.org/10.3390/fi14110316}, doi = {10.3390/FI14110316}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fi/BaiFY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/SutarM22, author = {Swapnil Sutar and Priyanka Mekala}, title = {Design of a performance evaluation platform for ultra-light crypto-system to develop a secure IoT node in edge computing}, journal = {Int. J. Embed. Syst.}, volume = {15}, number = {5}, pages = {429--447}, year = {2022}, url = {https://doi.org/10.1504/IJES.2022.10052027}, doi = {10.1504/IJES.2022.10052027}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/SutarM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/Zhong22, author = {Peifang Zhong}, title = {Exploring the role of edge computing on the legal effect of secure collaborative download protocol}, journal = {Int. J. Grid Util. Comput.}, volume = {13}, number = {2/3}, pages = {173--182}, year = {2022}, url = {https://doi.org/10.1504/IJGUC.2022.124400}, doi = {10.1504/IJGUC.2022.124400}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/Zhong22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/0002YKLBN022, author = {Xu Yang and Xun Yi and Ibrahim Khalil and Junwei Luo and Elisa Bertino and Surya Nepal and Xinyi Huang}, title = {Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {14}, pages = {12563--12572}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3138989}, doi = {10.1109/JIOT.2021.3138989}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/0002YKLBN022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GaiFWZJC22, author = {Keke Gai and Zhengkang Fang and Ruili Wang and Liehuang Zhu and Peng Jiang and Kim{-}Kwang Raymond Choo}, title = {Edge Computing and Lightning Network Empowered Secure Food Supply Management}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {16}, pages = {14247--14259}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2020.3024694}, doi = {10.1109/JIOT.2020.3024694}, timestamp = {Wed, 04 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GaiFWZJC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HuiCSHZLL22, author = {Yilong Hui and Nan Cheng and Zhou Su and Yuanhao Huang and Pincan Zhao and Tom H. Luan and Changle Li}, title = {Secure and Personalized Edge Computing Services in 6G Heterogeneous Vehicular Networks}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {8}, pages = {5920--5931}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3065970}, doi = {10.1109/JIOT.2021.3065970}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HuiCSHZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuDWJX22, author = {Yiran Liu and Ye Dong and Hao Wang and Han Jiang and Qiuliang Xu}, title = {Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {21}, pages = {21025--21037}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3176305}, doi = {10.1109/JIOT.2022.3176305}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiuDWJX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/TangNXZZN22, author = {Jianhang Tang and Jiangtian Nie and Zehui Xiong and Jun Zhao and Yang Zhang and Dusit Niyato}, title = {Slicing-Based Reliable Resource Orchestration for Secure Software-Defined Edge-Cloud Computing Systems}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {4}, pages = {2637--2648}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3107490}, doi = {10.1109/JIOT.2021.3107490}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/TangNXZZN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangGLKHH22, author = {Xiaoding Wang and Sahil Garg and Hui Lin and Georges Kaddoum and Jia Hu and M. Shamim Hossain}, title = {A Secure Data Aggregation Strategy in Edge Computing and Blockchain-Empowered Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {16}, pages = {14237--14246}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2020.3023588}, doi = {10.1109/JIOT.2020.3023588}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WangGLKHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DengW0022, author = {Yinjuan Deng and Shangping Wang and Qian Zhang and Duo Zhang}, title = {A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {16}, number = {2}, pages = {445--466}, year = {2022}, url = {https://doi.org/10.3837/tiis.2022.02.005}, doi = {10.3837/TIIS.2022.02.005}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/DengW0022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/QuWZ22, author = {Zhiguo Qu and Kunyi Wang and Min Zheng}, title = {Secure quantum fog computing model based on blind quantum computation}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {13}, number = {8}, pages = {3807--3817}, year = {2022}, url = {https://doi.org/10.1007/s12652-021-03402-7}, doi = {10.1007/S12652-021-03402-7}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/QuWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/DubeyS22, author = {Kalka Dubey and S. C. Sharma}, title = {An extended intelligent water drop approach for efficient {VM} allocation in secure cloud computing framework}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {7}, pages = {3948--3958}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2020.11.001}, doi = {10.1016/J.JKSUCI.2020.11.001}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/DubeyS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/SohalS22, author = {Manreet Sohal and Sandeep Sharma}, title = {{BDNA-A} {DNA} inspired symmetric key cryptographic technique to secure cloud computing}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {1}, pages = {1417--1425}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2018.09.024}, doi = {10.1016/J.JKSUCI.2018.09.024}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/SohalS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/ZeroualADB22, author = {Abdelhakim Zeroual and Mohamed Amroune and Makhlouf Derdour and Atef Bentahar}, title = {Lightweight deep learning model to secure authentication in Mobile Cloud Computing}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {9}, pages = {6938--6948}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2021.09.016}, doi = {10.1016/J.JKSUCI.2021.09.016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/ZeroualADB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jois/TingKSA22, author = {Li Ting and Mudassir Khan and Ashutosh Sharma and Mohd. Dilshad Ansari}, title = {A secure framework for IoT-based smart climate agriculture system: Toward blockchain and edge computing}, journal = {J. Intell. Syst.}, volume = {31}, number = {1}, pages = {221--236}, year = {2022}, url = {https://doi.org/10.1515/jisys-2022-0012}, doi = {10.1515/JISYS-2022-0012}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jois/TingKSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/YuZT22, author = {Xiaopeng Yu and Wei Zhao and Dianhua Tang}, title = {Efficient and provably secure multi-receiver signcryption scheme using implicit certificate in edge computing}, journal = {J. Syst. Archit.}, volume = {126}, pages = {102457}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102457}, doi = {10.1016/J.SYSARC.2022.102457}, timestamp = {Wed, 27 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/YuZT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/LeeLHAR22, author = {Cheng Pin Lee and Fabian Tee Jee Leng and Riyaz Ahamed Ariyaluran Habeeb and Mohamed Ahzam Amanullah and Muhammad Habib Ur Rehman}, title = {Edge computing-enabled secure and energy-efficient smart parking: {A} review}, journal = {Microprocess. Microsystems}, volume = {93}, pages = {104612}, year = {2022}, url = {https://doi.org/10.1016/j.micpro.2022.104612}, doi = {10.1016/J.MICPRO.2022.104612}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/LeeLHAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/YanWZ22, author = {Leibing Yan and Cuiqin Wang and Wei Zheng}, title = {Secure efficiency maximization for UAV-assisted mobile edge computing networks}, journal = {Phys. Commun.}, volume = {51}, pages = {101568}, year = {2022}, url = {https://doi.org/10.1016/j.phycom.2021.101568}, doi = {10.1016/J.PHYCOM.2021.101568}, timestamp = {Fri, 18 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/phycomm/YanWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/BairagiPBL22, author = {Ravi Bairagi and Preetesh Purohit and Kailash Chandra Bandhu and Ratnesh Litoriya}, title = {A secure and efficient mechanism for scheduling tasks in cloud computing environments}, journal = {Secur. Priv.}, volume = {5}, number = {5}, year = {2022}, url = {https://doi.org/10.1002/spy2.252}, doi = {10.1002/SPY2.252}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sap/BairagiPBL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/RamasamyKSPIB22, author = {Lakshmana Kumar Ramasamy and Firoz Khan and Mohammad Shah and Balusupati Veera Venkata Siva Prasad and Celestine Iwendi and Cresantus Biamba}, title = {Secure Smart Wearable Computing through Artificial Intelligence-Enabled Internet of Things and Cyber-Physical Systems for Health Monitoring}, journal = {Sensors}, volume = {22}, number = {3}, pages = {1076}, year = {2022}, url = {https://doi.org/10.3390/s22031076}, doi = {10.3390/S22031076}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/RamasamyKSPIB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ThirumalaisamyB22, author = {Manikandan Thirumalaisamy and Shajahan Basheer and Shitharth Selvarajan and Sara A. Althubiti and Fayadh Alenezi and Gautam Srivastava and Jerry Chun{-}Wei Lin}, title = {Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation}, journal = {Sensors}, volume = {22}, number = {19}, pages = {7169}, year = {2022}, url = {https://doi.org/10.3390/s22197169}, doi = {10.3390/S22197169}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ThirumalaisamyB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TseliosPAACPM22, author = {Christos Tselios and Ilias Politis and Dimitrios Amaxilatis and Orestis Akrivopoulos and Ioannis Chatzigiannakis and Spyros Panagiotakis and Evangelos K. Markakis}, title = {Melding Fog Computing and IoT for Deploying Secure, Response-Capable Healthcare Services in 5G and Beyond}, journal = {Sensors}, volume = {22}, number = {9}, pages = {3375}, year = {2022}, url = {https://doi.org/10.3390/s22093375}, doi = {10.3390/S22093375}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/TseliosPAACPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/UmorenSAPD22, author = {Otuekong Umoren and Raman Singh and Shahid Awan and Zeeshan Pervez and Keshav P. Dahal}, title = {Blockchain-Based Secure Authentication with Improved Performance for Fog Computing}, journal = {Sensors}, volume = {22}, number = {22}, pages = {8969}, year = {2022}, url = {https://doi.org/10.3390/s22228969}, doi = {10.3390/S22228969}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/UmorenSAPD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/WuLZMR22, author = {Qing Wu and Liangjun Li and Leyou Zhang and Yi Mu and Fatemeh Rezaeibagha}, title = {Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {4}, pages = {5533--5543}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2022.3144730}, doi = {10.1109/JSYST.2022.3144730}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/WuLZMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/Zouka22, author = {Hesham El Zouka}, title = {An Efficient and Secure Vehicular Networks Based on IoT and Cloud Computing}, journal = {{SN} Comput. Sci.}, volume = {3}, number = {3}, pages = {240}, year = {2022}, url = {https://doi.org/10.1007/s42979-022-01096-y}, doi = {10.1007/S42979-022-01096-Y}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/Zouka22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ChengLWFWZ22, author = {Hang Cheng and Ximeng Liu and Huaxiong Wang and Yan Fang and Meiqing Wang and Xiaopeng Zhao}, title = {SecureAD: {A} Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {2}, pages = {1413--1427}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.2990946}, doi = {10.1109/TCC.2020.2990946}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ChengLWFWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiMMWLC22, author = {Yingying Li and Jianfeng Ma and Yinbin Miao and Yue Wang and Ximeng Liu and Kim{-}Kwang Raymond Choo}, title = {Similarity Search for Encrypted Images in Secure Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {2}, pages = {1142--1155}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.2989923}, doi = {10.1109/TCC.2020.2989923}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/LiMMWLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/MengZK22, author = {Xinyu Meng and Lei Zhang and Burong Kang}, title = {Fast Secure and Anonymous Key Agreement Against Bad Randomness for Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {3}, pages = {1819--1830}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.3008795}, doi = {10.1109/TCC.2020.3008795}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/MengZK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/WangCWLJZ22, author = {Jin Wang and Chunming Cao and Jianping Wang and Kejie Lu and Admela Jukan and Wei Zhao}, title = {Optimal Task Allocation and Coding Design for Secure Edge Computing With Heterogeneous Edge Devices}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {4}, pages = {2817--2833}, year = {2022}, url = {https://doi.org/10.1109/TCC.2021.3050012}, doi = {10.1109/TCC.2021.3050012}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/WangCWLJZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/HeWCYJ22, author = {Ling He and Miaowen Wen and Yingyang Chen and Mengchun Yan and Bingli Jiao}, title = {Delay Aware Secure Offloading for NOMA-Assisted Mobile Edge Computing in Internet of Vehicles}, journal = {{IEEE} Trans. Commun.}, volume = {70}, number = {8}, pages = {5271--5284}, year = {2022}, url = {https://doi.org/10.1109/TCOMM.2022.3185064}, doi = {10.1109/TCOMM.2022.3185064}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/HeWCYJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/LaiFLDKN22, author = {Xiazhi Lai and Lisheng Fan and Xianfu Lei and Yansha Deng and George K. Karagiannidis and Arumugam Nallanathan}, title = {Secure Mobile Edge Computing Networks in the Presence of Multiple Eavesdroppers}, journal = {{IEEE} Trans. Commun.}, volume = {70}, number = {1}, pages = {500--513}, year = {2022}, url = {https://doi.org/10.1109/TCOMM.2021.3119075}, doi = {10.1109/TCOMM.2021.3119075}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcom/LaiFLDKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/NieWWGWGL22, author = {Laisen Nie and Yixuan Wu and Xiaojie Wang and Lei Guo and Guoyin Wang and Xinbo Gao and Shengtao Li}, title = {Intrusion Detection for Secure Social Internet of Things Based on Collaborative Edge Computing: {A} Generative Adversarial Network-Based Approach}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {9}, number = {1}, pages = {134--145}, year = {2022}, url = {https://doi.org/10.1109/TCSS.2021.3063538}, doi = {10.1109/TCSS.2021.3063538}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/NieWWGWGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuNLZXHD22, author = {Shengmin Xu and Jianting Ning and Yingjiu Li and Yinghui Zhang and Guowen Xu and Xinyi Huang and Robert H. Deng}, title = {Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {1064--1077}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3001557}, doi = {10.1109/TDSC.2020.3001557}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuNLZXHD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/XiaZGLJ22, author = {Zhuoqun Xia and Yichao Zhang and Ke Gu and Xiong Li and Weijia Jia}, title = {Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {6}, number = {1}, pages = {313--328}, year = {2022}, url = {https://doi.org/10.1109/TGCN.2021.3122793}, doi = {10.1109/TGCN.2021.3122793}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgcn/XiaZGLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuHLL22, author = {Donghyun Yu and Ruei{-}Hau Hsu and Jemin Lee and Sungjin Lee}, title = {{EC-SVC:} Secure {CAN} Bus In-Vehicle Communications With Fine-Grained Access Control Based on Edge Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {1388--1403}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3152405}, doi = {10.1109/TIFS.2022.3152405}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuHLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/HoudaBKKG22, author = {Zakaria Abou El Houda and Bouziane Brik and Adlen Ksentini and Lyes Khoukhi and Mohsen Guizani}, title = {When Federated Learning Meets Game Theory: {A} Cooperative Framework to Secure IIoT Applications on Edge Computing}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {11}, pages = {7988--7997}, year = {2022}, url = {https://doi.org/10.1109/TII.2022.3170347}, doi = {10.1109/TII.2022.3170347}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/HoudaBKKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LuDGHWZG22, author = {Weidang Lu and Yu Ding and Yuan Gao and Su Hu and Yuan Wu and Nan Zhao and Yi Gong}, title = {Resource and Trajectory Optimization for Secure Communications in Dual Unmanned Aerial Vehicle Mobile Edge Computing Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {4}, pages = {2704--2713}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3087726}, doi = {10.1109/TII.2021.3087726}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/LuDGHWZG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhouJLLMGT22, author = {Zhenyu Zhou and Zehan Jia and Haijun Liao and Wenbing Lu and Shahid Mumtaz and Mohsen Guizani and Muhammad Tariq}, title = {Secure and Latency-Aware Digital Twin Assisted Resource Scheduling for 5G Edge Computing-Empowered Distribution Grids}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {7}, pages = {4933--4943}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3137349}, doi = {10.1109/TII.2021.3137349}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhouJLLMGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/KimLKC22, author = {Hyeong{-}Jin Kim and Hyunjo Lee and Yong{-}Ki Kim and Jae{-}Woo Chang}, title = {Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing}, journal = {J. Supercomput.}, volume = {78}, number = {7}, pages = {9245--9284}, year = {2022}, url = {https://doi.org/10.1007/s11227-021-04286-2}, doi = {10.1007/S11227-021-04286-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/KimLKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/WuM0GK22, author = {Tsu{-}Yang Wu and Qian Meng and Lei Yang and Xinglan Guo and Saru Kumari}, title = {A provably secure lightweight authentication protocol in mobile edge computing environments}, journal = {J. Supercomput.}, volume = {78}, number = {12}, pages = {13893--13914}, year = {2022}, url = {https://doi.org/10.1007/s11227-022-04411-9}, doi = {10.1007/S11227-022-04411-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/WuM0GK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SamyEYZZ22, author = {Ahmed Samy and Ibrahim A. Elgendy and Haining Yu and Weizhe Zhang and Hongli Zhang}, title = {Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing With Deep Reinforcement Learning}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {19}, number = {4}, pages = {4872--4887}, year = {2022}, url = {https://doi.org/10.1109/TNSM.2022.3190493}, doi = {10.1109/TNSM.2022.3190493}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/SamyEYZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/BibiAMKD22, author = {Iram Bibi and Adnan Akhunzada and Jahanzaib Malik and Muhammad Khurram Khan and Muhammad Dawood}, title = {Secure Distributed Mobile Volunteer Computing with Android}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {1}, pages = {2:1--2:21}, year = {2022}, url = {https://doi.org/10.1145/3428151}, doi = {10.1145/3428151}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/BibiAMKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ShinKH22, author = {Hyungjune Shin and Dongyoung Koo and Junbeom Hur}, title = {Secure and Efficient Hybrid Data Deduplication in Edge Computing}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {3}, pages = {80:1--80:25}, year = {2022}, url = {https://doi.org/10.1145/3537675}, doi = {10.1145/3537675}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/ShinKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/QiuXZZ22, author = {Meikang Qiu and Ke Xu and Cheng Zhang and Tianwei Zhang}, title = {Introduction to the Special Section on Energy-efficient and Secure Computing for Artificial Intelligence and Beyond}, journal = {{ACM} Trans. Sens. Networks}, volume = {18}, number = {4}, pages = {51e:1--51e:3}, year = {2022}, url = {https://doi.org/10.1145/3558553}, doi = {10.1145/3558553}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/QiuXZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/Namasudra22, author = {Suyel Namasudra}, title = {Fast and Secure Data Accessing by Using {DNA} Computing for the Cloud Environment}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {4}, pages = {2289--2300}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3046471}, doi = {10.1109/TSC.2020.3046471}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/Namasudra22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangTLZS22, author = {Mengmeng Yang and Ivan Tjuawinata and Kwok{-}Yan Lam and Jun Zhao and Lin Sun}, title = {Secure Hot Path Crowdsourcing With Local Differential Privacy Under Fog Computing Architecture}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {4}, pages = {2188--2201}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.3039336}, doi = {10.1109/TSC.2020.3039336}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangTLZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiuZA22a, author = {Weiqi Liu and Shuai Zhang and Nirwan Ansari}, title = {Secure Mobile Edge Computing via a Drone-Enabled FSO-Based Heterogeneous Network}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {11}, pages = {12264--12274}, year = {2022}, url = {https://doi.org/10.1109/TVT.2022.3194407}, doi = {10.1109/TVT.2022.3194407}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/LiuZA22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/MaoLZDZWL22, author = {Sun Mao and Lei Liu and Ning Zhang and Mianxiong Dong and Jun Zhao and Jinsong Wu and Victor C. M. Leung}, title = {Reconfigurable Intelligent Surface-Assisted Secure Mobile Edge Computing Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {6}, pages = {6647--6660}, year = {2022}, url = {https://doi.org/10.1109/TVT.2022.3162044}, doi = {10.1109/TVT.2022.3162044}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/MaoLZDZWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/TangFZLGW22, author = {Qingqing Tang and Zesong Fei and Jianchao Zheng and Bin Li and Lei Guo and Jing Wang}, title = {Secure Aerial Computing: Convergence of Mobile Edge Computing and Blockchain for {UAV} Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {11}, pages = {12073--12087}, year = {2022}, url = {https://doi.org/10.1109/TVT.2022.3189818}, doi = {10.1109/TVT.2022.3189818}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/TangFZLGW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/RakeeiM22, author = {Mohammad Amin Rakeei and Farokhlagha Moazami}, title = {An efficient and provably secure authenticated key agreement scheme for mobile edge computing}, journal = {Wirel. Networks}, volume = {28}, number = {7}, pages = {2983--2999}, year = {2022}, url = {https://doi.org/10.1007/s11276-022-03005-w}, doi = {10.1007/S11276-022-03005-W}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/RakeeiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/Saad22, author = {Aldosary Saad}, title = {Hybrid Secure Equivalent Computing Model for Distributed Computing Applications}, journal = {Wirel. Pers. Commun.}, volume = {127}, number = {1}, pages = {319--339}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-08265-x}, doi = {10.1007/S11277-021-08265-X}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/Saad22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/ShamshadRMKO22, author = {Salman Shamshad and Minahil Rana and Khalid Mahmood and Muhammad Khurram Khan and Mohammad S. Obaidat}, title = {On the Security of {A} Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing}, journal = {Wirel. Pers. Commun.}, volume = {124}, number = {1}, pages = {283--292}, year = {2022}, url = {https://doi.org/10.1007/s11277-021-09338-7}, doi = {10.1007/S11277-021-09338-7}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/ShamshadRMKO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/AktypiKVR22, author = {Angeliki Aktypi and Dimitris Karnikis and Nikos Vasilakis and Kasper Rasmussen}, title = {Themis: {A} Secure Decentralized Framework for Microservice Interaction in Serverless Computing}, booktitle = {{ARES} 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022}, pages = {10:1--10:11}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3538969.3538983}, doi = {10.1145/3538969.3538983}, timestamp = {Fri, 19 Aug 2022 09:45:12 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/AktypiKVR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/IwamuraKI22, author = {Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal and Masaki Inamura}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1243--1245}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3527281}, doi = {10.1145/3488932.3527281}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/IwamuraKI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/SearleGGK22, author = {Richard Searle and Prabhanjan Gururaj and Anubhav Gupta and Kiran Kannur}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {Secure Implementation of Artificial Intelligence Applications for Anti-Money Laundering using Confidential Computing}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {3092--3098}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10021108}, doi = {10.1109/BIGDATA55660.2022.10021108}, timestamp = {Tue, 11 Jun 2024 10:44:02 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/SearleGGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ciss/AlexDD22, author = {Sona Alex and K. J. Dhanaraj and P. P. Deepthi}, title = {Secure Integer Comparison Protocol For ML-based Disease Diagnosis In {MHN} With Energy Efficient Edge Computing}, booktitle = {56th Annual Conference on Information Sciences and Systems, {CISS} 2022, Princeton, NJ, USA, March 9-11, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CISS53076.2022.9751179}, doi = {10.1109/CISS53076.2022.9751179}, timestamp = {Fri, 22 Apr 2022 19:18:39 +0200}, biburl = {https://dblp.org/rec/conf/ciss/AlexDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cit/MukherjeeB22, author = {Pratyusa Mukherjee and Rabindra Kumar Barik}, title = {Fog-QKD:Towards secure geospatial data sharing mechanism in geospatial fog computing system based on Quantum Key Distribution}, booktitle = {{OITS} International Conference on Information Technology, {OCIT} 2022, Bhubaneswar, India, December 14-16, 2022}, pages = {485--490}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/OCIT56763.2022.00096}, doi = {10.1109/OCIT56763.2022.00096}, timestamp = {Fri, 10 Mar 2023 12:02:44 +0100}, biburl = {https://dblp.org/rec/conf/cit/MukherjeeB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/CantuGR22, author = {Asahi Cantu and Jiahui Geng and Chunming Rong}, title = {{NFT} as a proof of Digital Ownership-reward system integrated to a Secure Distributed Computing Blockchain Framework}, booktitle = {{IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2022, Bangkok, Thailand, December 13-16, 2022}, pages = {97--104}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CloudCom55334.2022.00024}, doi = {10.1109/CLOUDCOM55334.2022.00024}, timestamp = {Thu, 11 Apr 2024 16:38:29 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/CantuGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/YuTSYFC22, author = {Huiqun Yu and Qifeng Tang and Zhiqing Shao and Yiming Yue and Guisheng Fan and Liqiong Chen}, editor = {Honghao Gao and Xinheng Wang and Wei Wei and Tasos Dagiuklas}, title = {Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge Computing}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 18th {EAI} International Conference, CollaborateCom 2022, Hangzhou, China, October 15-16, 2022, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {461}, pages = {111--132}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-24386-8\_7}, doi = {10.1007/978-3-031-24386-8\_7}, timestamp = {Wed, 01 Feb 2023 14:55:09 +0100}, biburl = {https://dblp.org/rec/conf/colcom/YuTSYFC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZouWLLGL22, author = {Xiaotian Zou and Jin Wang and Can Liu and Lingzhi Li and Fei Gu and Guojing Li}, editor = {Honghao Gao and Xinheng Wang and Wei Wei and Tasos Dagiuklas}, title = {Secure and Private Coding for Edge Computing Against Cooperative Attack with Low Communication Cost and Computational Load}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 18th {EAI} International Conference, CollaborateCom 2022, Hangzhou, China, October 15-16, 2022, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {460}, pages = {213--232}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-24383-7\_12}, doi = {10.1007/978-3-031-24383-7\_12}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ZouWLLGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cslaw/WalshVCSB22, author = {Julissa Milligan Walsh and Mayank Varia and Aloni Cohen and Andrew Sellars and Azer Bestavros}, editor = {Daniel J. Weitzner and Joan Feigenbaum and Christopher S. Yoo}, title = {Multi-Regulation Computing: Examining the Legal and Policy Questions That Arise From Secure Multiparty Computation}, booktitle = {Proceedings of the 2022 Symposium on Computer Science and Law, {CSLAW} 2022, Washington DC, USA, November 1-2, 2022}, pages = {53--65}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511265.3550445}, doi = {10.1145/3511265.3550445}, timestamp = {Thu, 03 Nov 2022 11:26:00 +0100}, biburl = {https://dblp.org/rec/conf/cslaw/WalshVCSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/SharmaGP22, author = {Pradip Kumar Sharma and Prosanta Gope and Deepak Puthal}, title = {Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022 - Workshops, Genoa, Italy, June 6-10, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSPW55150.2022.00008}, doi = {10.1109/EUROSPW55150.2022.00008}, timestamp = {Mon, 04 Jul 2022 17:06:18 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/SharmaGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ficloud/YaghiFQAHYG22, author = {Maha Yaghi and Zia Farhan and Lana Qamhieh and Marah Talal Alhalabi and Mohamad Hammoudi and Mohammed Yaghi and Mohammed Ghazal}, editor = {Muhammad Younas and Irfan Awan and Wenny Rahayu}, title = {Secure Proctoring of Contactless Handwritten-Assessments with Insufficient Computing Resources using Smartphones}, booktitle = {9th International Conference on Future Internet of Things and Cloud, FiCloud 2022, Rome, Italy, August 22-24, 2022}, pages = {302--306}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/FiCloud57274.2022.00050}, doi = {10.1109/FICLOUD57274.2022.00050}, timestamp = {Wed, 19 Oct 2022 21:24:43 +0200}, biburl = {https://dblp.org/rec/conf/ficloud/YaghiFQAHYG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KaratiD22, author = {Arijit Karati and Sajal K. Das}, title = {Federated Secure Data Sharing by Edge-Cloud Computing Model}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {1362--1367}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001335}, doi = {10.1109/GLOBECOM48099.2022.10001335}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/KaratiD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiuHZLNS22, author = {Lingshuang Liu and Cheng Huang and Dan Zhu and Dongxiao Liu and Jianbing Ni and Xuemin Sherman Shen}, title = {Secure and Distributed Access Control for Dynamic Pervasive Edge Computing Services}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {5487--5492}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10000715}, doi = {10.1109/GLOBECOM48099.2022.10000715}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiuHZLNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/Mathew22, author = {Sanu K. Mathew}, editor = {Ioannis Savidis and Avesta Sasan and Himanshu Thapliyal and Ronald F. DeMara}, title = {Attack-Resistant Circuit Technologies for sub-5nm Secure Computing Platforms}, booktitle = {{GLSVLSI} '22: Great Lakes Symposium on {VLSI} 2022, Irvine {CA} USA, June 6 - 8, 2022}, pages = {403}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3526241.3530053}, doi = {10.1145/3526241.3530053}, timestamp = {Fri, 03 Jun 2022 08:45:20 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/Mathew22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/KimKK22a, author = {Yonghwan Kim and Jahwan Koo and Ung{-}Mo Kim}, editor = {Masaaki Kurosu}, title = {Vulnerabilities and Secure Coding for Serverless Applications on Cloud Computing}, booktitle = {Human-Computer Interaction. User Experience and Behavior - Thematic Area, {HCI} 2022, Held as Part of the 24th {HCI} International Conference, {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13304}, pages = {145--163}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-05412-9\_10}, doi = {10.1007/978-3-031-05412-9\_10}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/KimKK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/XiaoJL22, author = {Di Xiao and Pengcen Jiang and Min Li}, title = {Communication-Efficient Federated Learning Based on Chained Secure Multiparty Computing and Compressed Sensing}, booktitle = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications; 8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022}, pages = {1539--1546}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00236}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00236}, timestamp = {Thu, 06 Apr 2023 11:34:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/XiaoJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpec/EdieKMH22, author = {Kelsie Edie and Kurt Keville and Lauren Milechin and Chris Hill}, title = {SuperCloud Lite in the Cloud - lightweight, secure, self-service, on-demand mechanisms for creating customizable research computing environments}, booktitle = {{IEEE} High Performance Extreme Computing Conference, {HPEC} 2022, Waltham, MA, USA, September 19-23, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPEC55821.2022.10089529}, doi = {10.1109/HPEC55821.2022.10089529}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpec/EdieKMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3i/SinghCBPGP22, author = {Rajesh Singh and Akkaraju Sailesh Chandra and Babeetta Bbhagat and Jeidy Panduro{-}Ramirez and Anil Pandurang Gaikwad and Bhasker Pant}, title = {Cloud Computing, Machine Learning, and Secure Data Sharing enabled through Blockchain}, booktitle = {5th International Conference on Contemporary Computing and Informatics, {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022}, pages = {282--286}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IC3I56241.2022.10072925}, doi = {10.1109/IC3I56241.2022.10072925}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic3i/SinghCBPGP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaiic/BhatADS22, author = {Sameer Ahmad Bhat and Dalia Alyahya and Muneer Ahmad Dar and Saadiya Shah}, title = {Edge-Computing based Secure E-learning Platforms}, booktitle = {2022 International Conference on Artificial Intelligence in Information and Communication, {ICAIIC} 2022, Jeju Island, Korea, Republic of, February 21-24, 2022}, pages = {324--328}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICAIIC54071.2022.9722680}, doi = {10.1109/ICAIIC54071.2022.9722680}, timestamp = {Tue, 08 Mar 2022 11:05:05 +0100}, biburl = {https://dblp.org/rec/conf/icaiic/BhatADS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiZCS22, author = {Shiyu Li and Yuan Zhang and Nan Cheng and Yaqing Song}, title = {Badge: Blockchain-Assisted Secure Authenticated Data Transmission in Mobile Edge Computing}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul, Korea, May 16-20, 2022}, pages = {4757--4762}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICC45855.2022.9838606}, doi = {10.1109/ICC45855.2022.9838606}, timestamp = {Fri, 19 Aug 2022 10:24:08 +0200}, biburl = {https://dblp.org/rec/conf/icc/LiZCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/WangLPHZWZ22, author = {Dawei Wang and Xuanrui Li and Linna Pang and Yixin He and Fuhui Zhou and Ling Wang and Ruonan Zhang}, title = {IRS-Aided Secure Mobile Edge Computing for {NOMA} Networks}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2022, Sanshui, Foshan, China, August 11-13, 2022}, pages = {25--30}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCC55456.2022.9880751}, doi = {10.1109/ICCC55456.2022.9880751}, timestamp = {Mon, 09 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/WangLPHZWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/FangLZCZL22, author = {Xiongjie Fang and Ruopan Lai and Zhipeng Zhou and Ziyang Chen and Peijia Zheng and Wei Lu}, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {Efficient and Secure Outsourced Image Watermarking in Cloud Computing}, booktitle = {Artificial Intelligence and Security - 8th International Conference, {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13339}, pages = {526--537}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06788-4\_44}, doi = {10.1007/978-3-031-06788-4\_44}, timestamp = {Thu, 28 Jul 2022 13:13:16 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/FangLZCZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccr/SawhneyKD22, author = {Govind Sawhney and Gagandeep Kaur and Rajesh Deorari}, title = {{CSPM:} {A} secure Cloud Computing Performance Management Model}, booktitle = {2022 International Conference on Cyber Resilience (ICCR), Dubai, United Arab Emirates, October 6-7, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICCR56254.2022.9995865}, doi = {10.1109/ICCR56254.2022.9995865}, timestamp = {Fri, 31 May 2024 12:01:49 +0200}, biburl = {https://dblp.org/rec/conf/iccr/SawhneyKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/AkmanGN50, author = {Gizem Akman and Philip Ginzboorg and Valtteri Niemi}, editor = {Osvaldo Gervasi and Beniamino Murgante and Sanjay Misra and Ana Maria A. C. Rocha and Chiara Garau}, title = {{AKMA} for Secure Multi-access Edge Computing Mobility in 5G}, booktitle = {Computational Science and Its Applications - {ICCSA} 2022 Workshops - Malaga, Spain, July 4-7, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13380}, pages = {432--449}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10542-5\_30}, doi = {10.1007/978-3-031-10542-5\_30}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/AkmanGN50.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/RamneekP22, author = {Ramneek and Sangheon Pack}, title = {A Lightweight and Secure Vehicular Edge Computing Framework for {V2X} Services}, booktitle = {42nd {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2022, Bologna, Italy, July 10-13, 2022}, pages = {1316--1317}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICDCS54860.2022.00146}, doi = {10.1109/ICDCS54860.2022.00146}, timestamp = {Thu, 20 Oct 2022 09:13:03 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/RamneekP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/YuZSLLWWL22, author = {Zhaoyang Yu and Sinong Zhao and Tongtong Su and Wenwen Liu and Xiaoguang Liu and Gang Wang and Zehua Wang and Victor C. M. Leung}, editor = {Javier Troya and Brahim Medjahed and Mario Piattini and Lina Yao and Pablo Fern{\'{a}}ndez and Antonio Ruiz{-}Cort{\'{e}}s}, title = {DeepSCJD: An Online Deep Learning-Based Model for Secure Collaborative Job Dispatching in Edge Computing}, booktitle = {Service-Oriented Computing - 20th International Conference, {ICSOC} 2022, Seville, Spain, November 29 - December 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13740}, pages = {481--497}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20984-0\_34}, doi = {10.1007/978-3-031-20984-0\_34}, timestamp = {Fri, 25 Nov 2022 16:03:20 +0100}, biburl = {https://dblp.org/rec/conf/icsoc/YuZSLLWWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icufn/ParkYJCK22, author = {Soohyun Park and Minjae Yoo and Soyi Jung and Minseok Choi and Joongheon Kim}, title = {Introduction to Secure Computing Methods in Unmanned Aerial Vehicles}, booktitle = {Thirteenth International Conference on Ubiquitous and Future Networks, {ICUFN} 2022, Barcelona, Spain, July 5-8, 2022}, pages = {239--241}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICUFN55119.2022.9829564}, doi = {10.1109/ICUFN55119.2022.9829564}, timestamp = {Tue, 26 Jul 2022 15:58:36 +0200}, biburl = {https://dblp.org/rec/conf/icufn/ParkYJCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-10/ChadwickGDD22, author = {Samuel Chadwick and Scott R. Graham and James Dean and Matthew Dallmeyer}, editor = {Jason Staggs and Sujeet Shenoi}, title = {Leveraging Confidential Computing to Enable Secure Information Sharing}, booktitle = {Critical Infrastructure Protection {XVI} - 16th {IFIP} {WG} 11.10 International Conference, {ICCIP} 2022, Virtual Event, March 14-15, 2022, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {666}, pages = {235--252}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20137-0\_9}, doi = {10.1007/978-3-031-20137-0\_9}, timestamp = {Thu, 08 Dec 2022 17:43:50 +0100}, biburl = {https://dblp.org/rec/conf/ifip11-10/ChadwickGDD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/MaYZB22, author = {Xuewei Ma and Wenyuan Yang and Yuesheng Zhu and Zhiqiang Bai}, title = {A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing}, booktitle = {{IEEE} International Performance, Computing, and Communications Conference, {IPCCC} 2022, Austin, TX, USA, November 11-13, 2022}, pages = {194--201}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IPCCC55026.2022.9894331}, doi = {10.1109/IPCCC55026.2022.9894331}, timestamp = {Wed, 01 Mar 2023 21:14:39 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/MaYZB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/TangAHGAA22, author = {Tingting Tang and Ramy E. Ali and Hanieh Hashemi and Tynan Gangwani and Salman Avestimehr and Murali Annavaram}, title = {Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning}, booktitle = {2022 {IEEE} International Parallel and Distributed Processing Symposium, {IPDPS} 2022, Lyon, France, May 30 - June 3, 2022}, pages = {628--638}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IPDPS53621.2022.00067}, doi = {10.1109/IPDPS53621.2022.00067}, timestamp = {Fri, 22 Jul 2022 11:14:30 +0200}, biburl = {https://dblp.org/rec/conf/ipps/TangAHGAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isci/ChenZZZ22, author = {Yichao Chen and Kai Zhao and Qinghai Zhang and Heng Zhang}, title = {Incentive Mechanism for Secure Mobile Edge Computing under Managed Eavesdropping Risk}, booktitle = {10th {IEEE} International Conference on Smart City and Informatization, iSCI 2022, Wuhan, China, December 9-11, 2022}, pages = {49--56}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/iSCI57775.2022.00017}, doi = {10.1109/ISCI57775.2022.00017}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isci/ChenZZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/PuthalDM22, author = {Deepak Puthal and Ernesto Damiani and Saraju P. Mohanty}, title = {Secure and Scalable Collaborative Edge Computing using Decision Tree}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2022, Nicosia, Cyprus, July 4-6, 2022}, pages = {247--252}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISVLSI54635.2022.00055}, doi = {10.1109/ISVLSI54635.2022.00055}, timestamp = {Tue, 25 Oct 2022 21:20:51 +0200}, biburl = {https://dblp.org/rec/conf/isvlsi/PuthalDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isvlsi/ZouZCWK22, author = {Minhui Zou and Junlong Zhou and Xiaotong Cui and Wei Wang and Shahar Kvatinsky}, title = {Enhancing Security of Memristor Computing System Through Secure Weight Mapping}, booktitle = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2022, Nicosia, Cyprus, July 4-6, 2022}, pages = {182--187}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISVLSI54635.2022.00044}, doi = {10.1109/ISVLSI54635.2022.00044}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isvlsi/ZouZCWK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/LeJLW22, author = {Yuwei Le and Yiheng Jiang and Xintong Ling and Jiaheng Wang}, title = {Efficient and Secure Collaborative Processing in Mobile Edge Computing via Blockchain}, booktitle = {2022 {IEEE} International Conferences on Internet of Things (iThings) and {IEEE} Green Computing {\&} Communications (GreenCom) and {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE} Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics), Espoo, Finland, August 22-25, 2022}, pages = {155--160}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00061}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS55523.2022.00061}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ithings/LeJLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/ChenS22, author = {Jiajun Chen and Chi Wan Sung}, title = {Weakly Secure Coded Distributed Computing with Group-based Function Assignment}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2022, Mumbai, India, November 1-9, 2022}, pages = {31--36}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ITW54588.2022.9965788}, doi = {10.1109/ITW54588.2022.9965788}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/ChenS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/JiangQSCZWCZLC22, author = {Jianyu Jiang and Ji Qi and Tianxiang Shen and Xusheng Chen and Shixiong Zhao and Sen Wang and Li Chen and Gong Zhang and Xiapu Luo and Heming Cui}, title = {{CRONUS:} Fault-isolated, Secure and High-performance Heterogeneous Computing for Trusted Execution Environment}, booktitle = {55th {IEEE/ACM} International Symposium on Microarchitecture, {MICRO} 2022, Chicago, IL, USA, October 1-5, 2022}, pages = {124--143}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MICRO56248.2022.00019}, doi = {10.1109/MICRO56248.2022.00019}, timestamp = {Fri, 24 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/micro/JiangQSCZWCZLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsp/ZhouCDZL22, author = {Zhipeng Zhou and Bing Chen and Chenyu Dong and Peijia Zheng and Wei Lu}, title = {Secure Image Watermarking in Cloud Computing with Distributed Paillier Cryptosystem}, booktitle = {24th {IEEE} International Workshop on Multimedia Signal Processing, {MMSP} 2022, Shanghai, China, September 26-28, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MMSP55362.2022.9949258}, doi = {10.1109/MMSP55362.2022.9949258}, timestamp = {Fri, 25 Nov 2022 16:03:16 +0100}, biburl = {https://dblp.org/rec/conf/mmsp/ZhouCDZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/Miglani0KM22, author = {Arzoo Miglani and Neeraj Kumar and Avadh Kishor and Nazeeruddin Mohammad}, title = {UAV-enabled edge computing and blockchain based secure charging station selection for energy trading in {V2G} environment}, booktitle = {Proceedings of the 5th International {ACM} Mobicom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, DroneCom 2022, Sydney, NSW, Australia, 17 October 2022}, pages = {103--108}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3555661.3560872}, doi = {10.1145/3555661.3560872}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mobicom/Miglani0KM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcloud/TiwariJ22, author = {Geetika Tiwari and Ruchi Jain}, title = {Detecting and Classifying Incoming Traffic in a Secure Cloud Computing Environment Using Machine Learning and Deep Learning System}, booktitle = {7th {IEEE} International Conference on Smart Cloud, SmartCloud 2022, Shanghai, China, October 8-10, 2022}, pages = {16--21}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SmartCloud55982.2022.00010}, doi = {10.1109/SMARTCLOUD55982.2022.00010}, timestamp = {Thu, 24 Nov 2022 14:56:22 +0100}, biburl = {https://dblp.org/rec/conf/smartcloud/TiwariJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/Cao0LW22, author = {Dayu Cao and Yinghui Zhang and Wei Liu and Xuanni Wei}, editor = {Xiaofeng Chen and Xinyi Huang and Miroslaw Kutylowski}, title = {Secure Asynchronous Federated Learning for Edge Computing Devices}, booktitle = {Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1663}, pages = {138--147}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-7242-3\_9}, doi = {10.1007/978-981-19-7242-3\_9}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/Cao0LW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/JinKNRSW22, author = {Weizhao Jin and Bhaskar Krishnamachari and Muhammad Naveed and Srivatsan Ravi and Eduard Sanou and Kwame{-}Lante Wright}, title = {Secure Publish-Process-Subscribe System for Dispersed Computing}, booktitle = {41st International Symposium on Reliable Distributed Systems, {SRDS} 2022, Vienna, Austria, September 19-22, 2022}, pages = {58--68}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SRDS55811.2022.00016}, doi = {10.1109/SRDS55811.2022.00016}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/srds/JinKNRSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/LiC0GBTZWHG22, author = {Zijun Li and Jiagan Cheng and Quan Chen and Eryu Guan and Zizheng Bian and Yi Tao and Bin Zha and Qiang Wang and Weidong Han and Minyi Guo}, editor = {Jiri Schindler and Noa Zilberman}, title = {RunD: {A} Lightweight Secure Container Runtime for High-density Deployment and High-concurrency Startup in Serverless Computing}, booktitle = {Proceedings of the 2022 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2022, Carlsbad, CA, USA, July 11-13, 2022}, pages = {53--68}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/atc22/presentation/li-zijun-rund}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/LiC0GBTZWHG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wocc/JiDWQS22, author = {Guangyuan Ji and Minghui Dai and Yuan Wu and Li Ping Qian and Zhou Su}, title = {Non-Orthogonal Multiple Access Assisted Secure Dual-UAV Mobile Edge Computing Networks}, booktitle = {31st Wireless and Optical Communications Conference, {WOCC} 2022, Shenzhen, China, August 11-12, 2022}, pages = {144--150}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/WOCC55104.2022.9880569}, doi = {10.1109/WOCC55104.2022.9880569}, timestamp = {Thu, 29 Sep 2022 21:52:19 +0200}, biburl = {https://dblp.org/rec/conf/wocc/JiDWQS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dasc/2022, title = {{IEEE} Intl. Conf. on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2022, Falerna, Italy, September 12-15, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy55231.2022}, doi = {10.1109/DASC/PICOM/CBDCOM/CY55231.2022}, isbn = {978-1-6654-6297-6}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2022, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022, Edinburgh, UK, June 22-24, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC54232.2022}, doi = {10.1109/DSC54232.2022}, isbn = {978-1-6654-2141-6}, timestamp = {Wed, 05 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/Madani22, author = {Omid Madani}, title = {Cisco Secure Workload Networks of Computing Hosts}, publisher = {{UCI} Machine Learning Repository}, year = {2022}, month = may, howpublished = {\url{https://doi.org/10.24432/C51K7Q}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.24432/C51K7Q}, doi = {10.24432/C51K7Q}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/data/10/Madani22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-00484, author = {Hisham A. Kholidy and Mohammad Ashiqur Rahman and Andrew Karam and Zahid Akhtar}, title = {Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform}, journal = {CoRR}, volume = {abs/2201.00484}, year = {2022}, url = {https://arxiv.org/abs/2201.00484}, eprinttype = {arXiv}, eprint = {2201.00484}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-00484.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-04816, author = {Hendrik F. R. Schmidt and J{\"{o}}rg Schl{\"{o}}tterer and Marcel Bargull and Enrico Nasca and Ryan Aydelott and Christin Seifert and Folker Meyer}, title = {Towards a trustworthy, secure and reliable enclave for machine learning in a hospital setting: The Essen Medical Computing Platform {(EMCP)}}, journal = {CoRR}, volume = {abs/2201.04816}, year = {2022}, url = {https://arxiv.org/abs/2201.04816}, eprinttype = {arXiv}, eprint = {2201.04816}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-04816.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-03134, author = {Farid Sorouri}, title = {Edge-computing Enabled Next Generation Wireless Networks: {A} Novel Approach to Provide Secure Multicast Services}, journal = {CoRR}, volume = {abs/2202.03134}, year = {2022}, url = {https://arxiv.org/abs/2202.03134}, eprinttype = {arXiv}, eprint = {2202.03134}, timestamp = {Wed, 09 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-03134.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-02833, author = {Maximilian Lam and Michael Mitzenmacher and Vijay Janapa Reddi and Gu{-}Yeon Wei and David Brooks}, title = {Tabula: Efficiently Computing Nonlinear Activation Functions for Secure Neural Network Inference}, journal = {CoRR}, volume = {abs/2203.02833}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.02833}, doi = {10.48550/ARXIV.2203.02833}, eprinttype = {arXiv}, eprint = {2203.02833}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-02833.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-06349, author = {Matteo Marcantoni and Bayu Jayawardhana and Mariano Perez Chaher and Kerstin Bunte}, title = {Secure Formation Control via Edge Computing Enabled by Fully Homomorphic Encryption and Mixed Uniform-Logarithmic Quantization}, journal = {CoRR}, volume = {abs/2204.06349}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.06349}, doi = {10.48550/ARXIV.2204.06349}, eprinttype = {arXiv}, eprint = {2204.06349}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-06349.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-14498, author = {Minhui Zou and Junlong Zhou and Xiaotong Cui and Wei Wang and Shahar Kvatinsky}, title = {Enhancing Security of Memristor Computing System Through Secure Weight Mapping}, journal = {CoRR}, volume = {abs/2206.14498}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.14498}, doi = {10.48550/ARXIV.2206.14498}, eprinttype = {arXiv}, eprint = {2206.14498}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-14498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-06433, author = {Tosin Ige and Sikiru Adewale}, title = {Implementation of Data Mining on a Secure Cloud Computing over a Web {API} using Supervised Machine Learning Algorithm}, journal = {CoRR}, volume = {abs/2208.06433}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.06433}, doi = {10.48550/ARXIV.2208.06433}, eprinttype = {arXiv}, eprint = {2208.06433}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-06433.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-09030, author = {Xuewei Ma and Wenyuan Yang and Yuesheng Zhu and Zhiqiang Bai}, title = {A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing}, journal = {CoRR}, volume = {abs/2208.09030}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.09030}, doi = {10.48550/ARXIV.2208.09030}, eprinttype = {arXiv}, eprint = {2208.09030}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-09030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-10027, author = {P. Srikanth and Adarsh Kumar}, title = {Secure Quantum Computing for Healthcare Sector: {A} Short Analysis}, journal = {CoRR}, volume = {abs/2211.10027}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.10027}, doi = {10.48550/ARXIV.2211.10027}, eprinttype = {arXiv}, eprint = {2211.10027}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-10027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/Hrda22, author = {Barbora Hrd{\'{a}}}, title = {Confidential Quantum Computing: Towards a Secure Computation on Untrusted Quantum Servers}, journal = {{ERCIM} News}, volume = {2022}, number = {128}, year = {2022}, url = {https://ercim-news.ercim.eu/en128/special/confidential-quantum-computing-towards-a-secure-computation-on-untrusted-quantum-servers}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ercim/Hrda22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ArifASS22, title = {Secure and Energy-Efficient Computational Offloading Using {LSTM} in Mobile Edge Computing}, journal = {Secur. Commun. Networks}, volume = {2022}, pages = {4937588:1--4937588:13}, year = {2022}, note = {Withdrawn.}, url = {https://doi.org/10.1155/2022/4937588}, doi = {10.1155/2022/4937588}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ArifASS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Aldawood21, author = {Mansour Aldawood}, title = {Secure virtual machines allocation in cloud computing environments}, school = {University of Warwick, Coventry, {UK}}, year = {2021}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.856334}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Aldawood21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/gr/Stergiou21, author = {Christos Stergiou}, title = {Efficient and secure algorithms for big data handling, processing, and delivery in cloud computing for Internet of Things networks}, school = {University of Macedonia, Thessaloniki, Greece}, year = {2021}, url = {http://hdl.handle.net/10442/hedi/49447}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/gr/Stergiou21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenHW21, author = {Wen{-}Chin Chen and Yin{-}Tzu Huang and Sheng{-}De Wang}, title = {Provable Secure Group Key Establishment Scheme for Fog Computing}, journal = {{IEEE} Access}, volume = {9}, pages = {158682--158694}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3130471}, doi = {10.1109/ACCESS.2021.3130471}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChenHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DewantaM21, author = {Favian Dewanta and Masahiro Mambo}, title = {Corrections to "A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment"}, journal = {{IEEE} Access}, volume = {9}, pages = {143592}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3121106}, doi = {10.1109/ACCESS.2021.3121106}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/DewantaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DinWZA21, author = {Nizamud Din and Abdul Waheed and Mahdi Zareei and Faisal S. Alanazi}, title = {An Improved Identity-Based Generalized Signcryption Scheme for Secure Multi-Access Edge Computing Empowered Flying Ad Hoc Networks}, journal = {{IEEE} Access}, volume = {9}, pages = {120704--120714}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3108130}, doi = {10.1109/ACCESS.2021.3108130}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DinWZA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GMKKN21, author = {P. G. Shynu and Varun G. Menon and R. Lakshmana Kumar and Seifedine Nimer Kadry and Yunyoung Nam}, title = {Blockchain-Based Secure Healthcare Application for Diabetic-Cardio Disease Prediction in Fog Computing}, journal = {{IEEE} Access}, volume = {9}, pages = {45706--45720}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3065440}, doi = {10.1109/ACCESS.2021.3065440}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GMKKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/KhanKKAKZKI21, author = {Abudul Wahid Khan and Maseeh Ullah Khan and Javed Ali Khan and Arshad Ahmad and Khalil Khan and Muhammad Zamir and Wonjoon Kim and Muhammad Fazal Ijaz}, title = {Analyzing and Evaluating Critical Challenges and Practices for Software Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based Systematic Approach}, journal = {{IEEE} Access}, volume = {9}, pages = {107309--107332}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3100287}, doi = {10.1109/ACCESS.2021.3100287}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/KhanKKAKZKI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaherN21, author = {Reda Maher and Omar A. Nasr}, title = {DropStore: {A} Secure Backup System Using Multi-Cloud and Fog Computing}, journal = {{IEEE} Access}, volume = {9}, pages = {71318--71327}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3078887}, doi = {10.1109/ACCESS.2021.3078887}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaherN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/NijimA21, author = {Mais Nijim and Hisham Albataineh}, title = {Secure-Stor: {A} Novel Hybrid Storage System Architecture to Enhance Security and Performance in Edge Computing}, journal = {{IEEE} Access}, volume = {9}, pages = {92446--92459}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3092732}, doi = {10.1109/ACCESS.2021.3092732}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/NijimA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WengLCLD21, author = {Chi{-}Yao Weng and Chun{-}Ta Li and Chin{-}Ling Chen and Cheng{-}Chi Lee and Yong{-}Yuan Deng}, title = {A Lightweight Anonymous Authentication and Secure Communication Scheme for Fog Computing Services}, journal = {{IEEE} Access}, volume = {9}, pages = {145522--145537}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3123234}, doi = {10.1109/ACCESS.2021.3123234}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WengLCLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangS21a, author = {Xingjun Zhang and Wei Si}, title = {Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud Computing}, journal = {{IEEE} Access}, volume = {9}, pages = {37951--37960}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2020.2971630}, doi = {10.1109/ACCESS.2020.2971630}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/SauberESAH21, author = {Amr M. Sauber and Passent Mohammed El{-}Kafrawy and Amr F. Shawish and Mohamed Amin and Ismail M. Hagag}, title = {A New Secure Model for Data Protection over Cloud Computing}, journal = {Comput. Intell. Neurosci.}, volume = {2021}, pages = {8113253:1--8113253:11}, year = {2021}, url = {https://doi.org/10.1155/2021/8113253}, doi = {10.1155/2021/8113253}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cin/SauberESAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cin/SiamAAEBSEE21, author = {Ali I. Siam and Mohammed Amin Almaiah and Ali Al{-}Zahrani and Atef Abou Elazm and Ghada M. El Banby and Walid El Shafai and Fathi E. Abd El{-}Samie and Nirmeen A. El{-}Bahnasawy}, title = {Secure Health Monitoring Communication Systems Based on IoT and Cloud Computing for Medical Emergency Applications}, journal = {Comput. Intell. Neurosci.}, volume = {2021}, pages = {8016525:1--8016525:23}, year = {2021}, url = {https://doi.org/10.1155/2021/8016525}, doi = {10.1155/2021/8016525}, timestamp = {Wed, 08 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cin/SiamAAEBSEE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AliCMGLZ21, author = {Zeeshan Ali and Shehzad Ashraf Chaudhry and Khalid Mahmood and Sahil Garg and Zhihan Lv and Yousaf Bin Zikria}, title = {A clogging resistant secure authentication scheme for fog computing services}, journal = {Comput. Networks}, volume = {185}, pages = {107731}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2020.107731}, doi = {10.1016/J.COMNET.2020.107731}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AliCMGLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AmanlouHB21, author = {Sanaz Amanlou and Mohammad Kamrul Hasan and Khairul Azmi Abu Bakar}, title = {Lightweight and secure authentication scheme for IoT network based on publish-subscribe fog computing model}, journal = {Comput. Networks}, volume = {199}, pages = {108465}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108465}, doi = {10.1016/J.COMNET.2021.108465}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AmanlouHB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/ShiZWHW21, author = {Minyu Shi and Yongting Zhang and Huanhuan Wang and Junfeng Hu and Xiang Wu}, title = {A Clonal Selection Optimization System for Multiparty Secure Computing}, journal = {Complex.}, volume = {2021}, pages = {7638394:1--7638394:14}, year = {2021}, url = {https://doi.org/10.1155/2021/7638394}, doi = {10.1155/2021/7638394}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/ShiZWHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KalariaKRP21, author = {Rudri Kalaria and A. S. M. Kayes and Wenny Rahayu and Eric Pardede}, title = {A Secure Mutual authentication approach to fog computing environment}, journal = {Comput. Secur.}, volume = {111}, pages = {102483}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102483}, doi = {10.1016/J.COSE.2021.102483}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KalariaKRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/BocciFFB21, author = {Alessandro Bocci and Stefano Forti and Gian{-}Luigi Ferrari and Antonio Brogi}, title = {Secure FaaS orchestration in the fog: how far are we?}, journal = {Computing}, volume = {103}, number = {5}, pages = {1025--1056}, year = {2021}, url = {https://doi.org/10.1007/s00607-021-00924-y}, doi = {10.1007/S00607-021-00924-Y}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/BocciFFB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/MerzougMGD21, author = {Mohammed Amine Merzoug and Ahmed Mostefaoui and Gabriele Gianini and Ernesto Damiani}, title = {Smart connected parking lots based on secured multimedia IoT devices}, journal = {Computing}, volume = {103}, number = {6}, pages = {1143--1164}, year = {2021}, url = {https://doi.org/10.1007/s00607-021-00921-1}, doi = {10.1007/S00607-021-00921-1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/MerzougMGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/YakubuKJK21, author = {Bello Musa Yakubu and Majid I. Khan and Nadeem Javaid and Abid Khan}, title = {Blockchain-based secure multi-resource trading model for smart marketplace}, journal = {Computing}, volume = {103}, number = {3}, pages = {379--400}, year = {2021}, url = {https://doi.org/10.1007/s00607-020-00886-7}, doi = {10.1007/S00607-020-00886-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/computing/YakubuKJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/KolodziejJ21, author = {Joanna Kolodziej and Martin Gilje Jaatun}, title = {Secure mobile cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {33}, number = {18}, year = {2021}, url = {https://doi.org/10.1002/cpe.6528}, doi = {10.1002/CPE.6528}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/KolodziejJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dmaa/Poureidi21, author = {Abolfazl Poureidi}, title = {On computing secure domination of trees}, journal = {Discret. Math. Algorithms Appl.}, volume = {13}, number = {5}, pages = {2150055:1--2150055:15}, year = {2021}, url = {https://doi.org/10.1142/S1793830921500555}, doi = {10.1142/S1793830921500555}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dmaa/Poureidi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eis/ChenHWKW21, author = {Chien{-}Ming Chen and Yanyu Huang and King{-}Hang Wang and Saru Kumari and Mu{-}En Wu}, title = {A secure authenticated and key exchange scheme for fog computing}, journal = {Enterp. Inf. Syst.}, volume = {15}, number = {9}, pages = {1200--1215}, year = {2021}, url = {https://doi.org/10.1080/17517575.2020.1712746}, doi = {10.1080/17517575.2020.1712746}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eis/ChenHWKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/ZhangPWJSC21, author = {Lejun Zhang and Minghui Peng and Weizheng Wang and Zilong Jin and Yansen Su and Huiling Chen}, title = {Secure and efficient data storage and sharing scheme for blockchain-based mobile-edge computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {32}, number = {10}, year = {2021}, url = {https://doi.org/10.1002/ett.4315}, doi = {10.1002/ETT.4315}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/ZhangPWJSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaip/AgarwalRP21, author = {Neha Agarwal and Ajay Rana and Jai Prakash Pandey}, title = {An efficient and optimised approach for secured file sharing in cloud computing}, journal = {Int. J. Adv. Intell. Paradigms}, volume = {18}, number = {2}, pages = {232--246}, year = {2021}, url = {https://doi.org/10.1504/IJAIP.2021.112905}, doi = {10.1504/IJAIP.2021.112905}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaip/AgarwalRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/SubarajaSKJ21, author = {S. Kanaga Subaraja and A. Sathya and S. Karthikeyan and T. Janane}, title = {Multi cloud-based secure privacy preservation of hospital data in cloud computing}, journal = {Int. J. Cloud Comput.}, volume = {10}, number = {1/2}, pages = {101--111}, year = {2021}, url = {https://doi.org/10.1504/IJCC.2021.113993}, doi = {10.1504/IJCC.2021.113993}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/SubarajaSKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/KumarAKKK21, author = {Vinod Kumar and Musheer Ahmad and Adesh Kumari and Saru Kumari and Muhammad Khurram Khan}, title = {{SEBAP:} {A} secure and efficient biometric-assisted authentication protocol using {ECC} for vehicular cloud computing}, journal = {Int. J. Commun. Syst.}, volume = {34}, number = {2}, year = {2021}, url = {https://doi.org/10.1002/dac.4103}, doi = {10.1002/DAC.4103}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/KumarAKKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/SukumaranM21, author = {Sreeja Cherillath Sukumaran and Mohammed Misbahuddin}, title = {Secure key exchange scheme: a {DNA} computing-based approach to resist {MITM} in {DHKE}}, journal = {Int. J. Inf. Comput. Secur.}, volume = {16}, number = {3/4}, pages = {307--323}, year = {2021}, url = {https://doi.org/10.1504/IJICS.2021.118955}, doi = {10.1504/IJICS.2021.118955}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/SukumaranM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmcmc/LiuWCTZ21, author = {Jiasen Liu and Xu An Wang and Bowei Chen and Zheng Tu and Kaiyang Zhao}, title = {Outsourced Secure Face Recognition Based on {CKKS} Homomorphic Encryption in Cloud Computing}, journal = {Int. J. Mob. Comput. Multim. Commun.}, volume = {12}, number = {3}, pages = {27--43}, year = {2021}, url = {https://doi.org/10.4018/ijmcmc.2021070103}, doi = {10.4018/IJMCMC.2021070103}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijmcmc/LiuWCTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpcc/Vaithyasubramanian21, author = {S. Vaithyasubramanian and R. Sundararajan}, title = {State space classification of Markov password - an alphanumeric password authentication scheme for secure communication in cloud computing}, journal = {Int. J. Pervasive Comput. Commun.}, volume = {17}, number = {1}, pages = {121--134}, year = {2021}, url = {https://doi.org/10.1108/IJPCC-05-2020-0035}, doi = {10.1108/IJPCC-05-2020-0035}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpcc/Vaithyasubramanian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/BoudiaS21, author = {Omar Rafik Merad Boudia and Sidi Mohammed Senouci}, title = {An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {8}, pages = {6143--6153}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3040982}, doi = {10.1109/JIOT.2020.3040982}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/BoudiaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GaoLCL21, author = {Ying Gao and Hongliang Lin and Yijian Chen and Yangliang Liu}, title = {Blockchain and SGX-Enabled Edge-Computing-Empowered Secure IoMT Data Analysis}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {21}, pages = {15785--15795}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3052604}, doi = {10.1109/JIOT.2021.3052604}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/GaoLCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/GroverACSC21, author = {Harsh Grover and Tejasvi Alladi and Vinay Chamola and Dheerendra Singh and Kim{-}Kwang Raymond Choo}, title = {Edge Computing and Deep Learning Enabled Secure Multitier Network for Internet of Vehicles}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {19}, pages = {14787--14796}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3071362}, doi = {10.1109/JIOT.2021.3071362}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/GroverACSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HassijaCKKG21, author = {Vikas Hassija and Vinay Chamola and Dara Nanda Gopala Krishna and Neeraj Kumar and Mohsen Guizani}, title = {A Blockchain and Edge-Computing-Based Secure Framework for Government Tender Allocation}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {4}, pages = {2409--2418}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3027070}, doi = {10.1109/JIOT.2020.3027070}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/HassijaCKKG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KimHLJLK21, author = {Bongjun Kim and Seonyeong Heo and Jaeho Lee and Shinnung Jeong and Yongwoo Lee and Hanjun Kim}, title = {Compiler-Assisted Semantic-Aware Encryption for Efficient and Secure Serverless Computing}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {7}, pages = {5645--5656}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3031550}, doi = {10.1109/JIOT.2020.3031550}, timestamp = {Thu, 28 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/KimHLJLK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiZJYXZ21, author = {Yong Li and Yipeng Zhou and Alireza Jolfaei and Dongjin Yu and Gaochao Xu and Xi Zheng}, title = {Privacy-Preserving Federated Learning Framework Based on Chained Secure Multiparty Computing}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {8}, pages = {6178--6186}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3022911}, doi = {10.1109/JIOT.2020.3022911}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiZJYXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuFPCMSD21, author = {Lei Liu and Jie Feng and Qingqi Pei and Chen Chen and Yang Ming and Bodong Shang and Mianxiong Dong}, title = {Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing: An Asynchronous Advantage Actor-Critic Learning Approach}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {4}, pages = {2342--2353}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3048345}, doi = {10.1109/JIOT.2020.3048345}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiuFPCMSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WuDW21, author = {Yulei Wu and Hong{-}Ning Dai and Hao Wang}, title = {Convergence of Blockchain and Edge Computing for Secure and Scalable IIoT Critical Infrastructures in Industry 4.0}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {4}, pages = {2300--2317}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3025916}, doi = {10.1109/JIOT.2020.3025916}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WuDW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangEHIDGE21, author = {Weizhe Zhang and Ibrahim A. Elgendy and Mohamed Hammad and Abdullah M. Iliyasu and Xiaojiang Du and Mohsen Guizani and Ahmed A. Abd El{-}Latif}, title = {Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {10}, pages = {8119--8132}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3042433}, doi = {10.1109/JIOT.2020.3042433}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangEHIDGE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/WazidBDGNH21, author = {Mohammad Wazid and Basudeb Bera and Ashok Kumar Das and Sahil Garg and Dusit Niyato and M. Shamim Hossain}, title = {Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled Aerial Computing Deployment}, journal = {{IEEE} Internet Things Mag.}, volume = {4}, number = {3}, pages = {120--126}, year = {2021}, url = {https://doi.org/10.1109/IOTM.1001.2100047}, doi = {10.1109/IOTM.1001.2100047}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/WazidBDGNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/YangWWWZL21, author = {Qing Yang and Hao Wang and Xiaoxiao Wu and Taotao Wang and Shengli Zhang and Naijin Liu}, title = {Secure Blockchain Platform for Industrial IoT with Trusted Computing Hardware}, journal = {{IEEE} Internet Things Mag.}, volume = {4}, number = {4}, pages = {86--92}, year = {2021}, url = {https://doi.org/10.1109/IOTM.001.2100043}, doi = {10.1109/IOTM.001.2100043}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/YangWWWZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isi/SheetalLGN21, author = {Annabathula Phani Sheetal and Giddaluru Lalitha and Arepalli Peda Gopi and Vejendla Lakshman Narayana}, title = {Secured Data Transmission with Integrated Fault Reduction Scheduling in Cloud Computing}, journal = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.}, volume = {26}, number = {2}, pages = {225--230}, year = {2021}, url = {https://doi.org/10.18280/isi.260209}, doi = {10.18280/ISI.260209}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isi/SheetalLGN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LinWGY21, author = {Yijian Lin and Xiaoming Wang and Qingqing Gan and Mengting Yao}, title = {A secure cross-domain authentication scheme with perfect forward security and complete anonymity in fog computing}, journal = {J. Inf. Secur. Appl.}, volume = {63}, pages = {103022}, year = {2021}, url = {https://doi.org/10.1016/j.jisa.2021.103022}, doi = {10.1016/J.JISA.2021.103022}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LinWGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/TiwariG21, author = {Deepnarayan Tiwari and G. R. Gangadharan}, title = {SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {12}, pages = {10539--10563}, year = {2021}, url = {https://doi.org/10.1007/s12652-020-02864-5}, doi = {10.1007/S12652-020-02864-5}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/TiwariG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaise/MansoorV21, author = {Wathiq Mansoor and Varadarajan Vijayakumar}, title = {Trustworthy computing for secure smart cities}, journal = {J. Ambient Intell. Smart Environ.}, volume = {13}, number = {3}, pages = {183--184}, year = {2021}, url = {https://doi.org/10.3233/AIS-210597}, doi = {10.3233/AIS-210597}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaise/MansoorV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/MinKLM21, author = {Jie Min and Xiaoyan Kui and Junbin Liang and Xingpo Ma}, title = {Secure Top-k query in edge-computing-assisted sensor-cloud systems}, journal = {J. Syst. Archit.}, volume = {119}, pages = {102244}, year = {2021}, url = {https://doi.org/10.1016/j.sysarc.2021.102244}, doi = {10.1016/J.SYSARC.2021.102244}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/MinKLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsait/YangA21, author = {Chien{-}Sheng Yang and Amir Salman Avestimehr}, title = {Coded Computing for Secure Boolean Computations}, journal = {{IEEE} J. Sel. Areas Inf. Theory}, volume = {2}, number = {1}, pages = {326--337}, year = {2021}, url = {https://doi.org/10.1109/JSAIT.2021.3055341}, doi = {10.1109/JSAIT.2021.3055341}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsait/YangA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/ChangLCQ21, author = {Dajun Chang and Li Li and Ying Chang and Zhangquan Qiao}, title = {Cloud Computing Storage Backup and Recovery Strategy Based on Secure IoT and Spark}, journal = {Mob. Inf. Syst.}, volume = {2021}, pages = {9505249:1--9505249:13}, year = {2021}, url = {https://doi.org/10.1155/2021/9505249}, doi = {10.1155/2021/9505249}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mis/ChangLCQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/RiveraRH21, author = {Angelo Vera Rivera and Ahmed Refaey and Ekram Hossain}, title = {A Blockchain Framework for Secure Task Sharing in Multi-Access Edge Computing}, journal = {{IEEE} Netw.}, volume = {35}, number = {3}, pages = {176--183}, year = {2021}, url = {https://doi.org/10.1109/MNET.011.2000497}, doi = {10.1109/MNET.011.2000497}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/RiveraRH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/AmosLWW21, author = {Peprah Amos and Pei Li and Wei Wu and Baoyun Wang}, title = {Computation efficiency maximization for secure UAV-enabled mobile edge computing networks}, journal = {Phys. Commun.}, volume = {46}, pages = {101284}, year = {2021}, url = {https://doi.org/10.1016/j.phycom.2021.101284}, doi = {10.1016/J.PHYCOM.2021.101284}, timestamp = {Thu, 27 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/phycomm/AmosLWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/LaiZTXZF21, author = {Shiwei Lai and Rui Zhao and Shunpu Tang and Junjuan Xia and Fasheng Zhou and Liseng Fan}, title = {Intelligent secure mobile edge computing for beyond 5G wireless networks}, journal = {Phys. Commun.}, volume = {45}, pages = {101283}, year = {2021}, url = {https://doi.org/10.1016/j.phycom.2021.101283}, doi = {10.1016/J.PHYCOM.2021.101283}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/phycomm/LaiZTXZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/GawasPG21, author = {Mahadev A. Gawas and Hemprasad Yashwant Patil and Sweta S. Govekar}, title = {An integrative approach for secure data sharing in vehicular edge computing using Blockchain}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {5}, pages = {2840--2857}, year = {2021}, url = {https://doi.org/10.1007/s12083-021-01107-4}, doi = {10.1007/S12083-021-01107-4}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/GawasPG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CuiFL21, author = {Mengmeng Cui and Yiming Fei and Yin Liu}, title = {A Survey on Secure Deployment of Mobile Services in Edge Computing}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {8846239:1--8846239:8}, year = {2021}, url = {https://doi.org/10.1155/2021/8846239}, doi = {10.1155/2021/8846239}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CuiFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FengWLF21, author = {Tao Feng and Xusheng Wang and Chunyan Liu and Junli Fang}, title = {Secure Data Collaborative Computing Scheme Based on Blockchain}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6630291:1--6630291:9}, year = {2021}, url = {https://doi.org/10.1155/2021/6630291}, doi = {10.1155/2021/6630291}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FengWLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GuoS21a, author = {Jingjing Guo and Jiacong Sun}, title = {Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {5686506:1--5686506:17}, year = {2021}, url = {https://doi.org/10.1155/2021/5686506}, doi = {10.1155/2021/5686506}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/GuoS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ParkS21a, author = {BoSun Park and Seog Chung Seo}, title = {Efficient Implementation of {NIST} {LWC} {ESTATE} Algorithm Using OpenCL and Web Assembly for Secure Communication in Edge Computing Environment}, journal = {Sensors}, volume = {21}, number = {6}, pages = {1987}, year = {2021}, url = {https://doi.org/10.3390/s21061987}, doi = {10.3390/S21061987}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/ParkS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/DharminderOMD21, author = {Dharminder Dharminder and Mohammad S. Obaidat and Dheerendra Mishra and Ashok Kumar Das}, title = {{SFEEC:} Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {1}, pages = {598--606}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.2978015}, doi = {10.1109/JSYST.2020.2978015}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/DharminderOMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LiCLL21, author = {Yuting Li and Qingfeng Cheng and Ximeng Liu and Xinghua Li}, title = {A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {1}, pages = {935--946}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.2979006}, doi = {10.1109/JSYST.2020.2979006}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/LiCLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soca/BenifaG21, author = {J. V. Bibal Benifa and Venifa Mini G}, title = {Modified Chebyshev polynomial-based access control mechanism for secured data access in cloud computing environment}, journal = {Serv. Oriented Comput. Appl.}, volume = {15}, number = {3}, pages = {187--203}, year = {2021}, url = {https://doi.org/10.1007/s11761-020-00307-9}, doi = {10.1007/S11761-020-00307-9}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soca/BenifaG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/GoumidiHAG21, author = {Hadjer Goumidi and Saad Harous and Zibouda Aliouat and Abdelhak Mourad Gu{\'{e}}roui}, title = {Lightweight Secure Authentication and Key Distribution Scheme for Vehicular Cloud Computing}, journal = {Symmetry}, volume = {13}, number = {3}, pages = {484}, year = {2021}, url = {https://doi.org/10.3390/sym13030484}, doi = {10.3390/SYM13030484}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/GoumidiHAG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/000921, author = {Lei Zhang}, title = {Key Management Scheme for Secure Channel Establishment in Fog Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {3}, pages = {1117--1128}, year = {2021}, url = {https://doi.org/10.1109/TCC.2019.2903254}, doi = {10.1109/TCC.2019.2903254}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/000921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ElgendyZLH21, author = {Ibrahim A. Elgendy and Weizhe Zhang and Chuan{-}Yi Liu and Ching{-}Hsien Hsu}, title = {An Efficient and Secured Framework for Mobile Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {1}, pages = {79--87}, year = {2021}, url = {https://doi.org/10.1109/TCC.2018.2847347}, doi = {10.1109/TCC.2018.2847347}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/ElgendyZLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ElgendyZLH21a, author = {Ibrahim A. Elgendy and Weizhe Zhang and Chuan{-}Yi Liu and Ching{-}Hsien Hsu}, title = {Correction to "An Efficient and Secured Framework For Mobile Cloud Computing"}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {2}, pages = {844}, year = {2021}, url = {https://doi.org/10.1109/TCC.2021.3066023}, doi = {10.1109/TCC.2021.3066023}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ElgendyZLH21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/HuangYYH21, author = {Qinlong Huang and Yixian Yang and Wei Yue and Yue He}, title = {Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {4}, pages = {1607--1618}, year = {2021}, url = {https://doi.org/10.1109/TCC.2019.2908163}, doi = {10.1109/TCC.2019.2908163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/HuangYYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/YuA21, author = {Qian Yu and Amir Salman Avestimehr}, title = {Coded Computing for Resilient, Secure, and Privacy-Preserving Distributed Matrix Multiplication}, journal = {{IEEE} Trans. Commun.}, volume = {69}, number = {1}, pages = {59--72}, year = {2021}, url = {https://doi.org/10.1109/TCOMM.2020.3032196}, doi = {10.1109/TCOMM.2020.3032196}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/YuA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/RuangwisesI21, author = {Suthee Ruangwises and Toshiya Itoh}, title = {Securely computing the \emph{n}-variable equality function with 2\emph{n} cards}, journal = {Theor. Comput. Sci.}, volume = {887}, pages = {99--110}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.07.007}, doi = {10.1016/J.TCS.2021.07.007}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/RuangwisesI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ElrabaaAA21, author = {Muhammad E. S. Elrabaa and Mohammed Alasli and Marwan H. Abu{-}Amara}, title = {Secure Computing Enclaves Using FPGAs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {593--604}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2933214}, doi = {10.1109/TDSC.2019.2933214}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ElrabaaAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GeSLXSF21, author = {Chunpeng Ge and Willy Susilo and Zhe Liu and Jinyue Xia and Pawel Szalachowski and Liming Fang}, title = {Secure Keyword Search and Data Sharing Mechanism for Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2787--2800}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.2963978}, doi = {10.1109/TDSC.2020.2963978}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GeSLXSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HongINS21, author = {Yuan Hong and Val{\'{e}}rie Issarny and Surya Nepal and Mudhakar Srivatsa}, title = {Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1511--1512}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2021.3076120}, doi = {10.1109/TDSC.2021.3076120}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HongINS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiLGW21, author = {Wei Li and Xuelian Li and Juntao Gao and Haiyu Wang}, title = {Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1276--1290}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2909890}, doi = {10.1109/TDSC.2019.2909890}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiLGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuWSYJCX21, author = {Yulin Wu and Xuan Wang and Willy Susilo and Guomin Yang and Zoe Lin Jiang and Qian Chen and Peng Xu}, title = {Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2820--2834}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.2966632}, doi = {10.1109/TDSC.2020.2966632}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WuWSYJCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/HongINS21, author = {Yuan Hong and Val{\'{e}}rie Issarny and Surya Nepal and Mudhakar Srivatsa}, title = {Guest Editors' Introduction to the Joint Special Section on Secure and Emerging Collaborative Computing and Intelligent Systems}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {3}, pages = {1328--1329}, year = {2021}, url = {https://doi.org/10.1109/TETC.2021.3076338}, doi = {10.1109/TETC.2021.3076338}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/HongINS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/MendisWWSR21, author = {Gihan J. Mendis and Yifu Wu and Jin Wei and Moein Sabounchi and Rigoberto Roche'}, title = {A Blockchain-Powered Decentralized and Secure Computing Paradigm}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {4}, pages = {2201--2222}, year = {2021}, url = {https://doi.org/10.1109/TETC.2020.2983007}, doi = {10.1109/TETC.2020.2983007}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/MendisWWSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/KhanJRMAW21, author = {Fazlullah Khan and Mian Ahmad Jan and Ateeq Ur Rehman and Spyridon Mastorakis and Mamoun Alazab and Paul A. Watters}, title = {A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive Edge Computing}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {7}, pages = {5128--5137}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3037872}, doi = {10.1109/TII.2020.3037872}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/KhanJRMAW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LiMMLLC21, author = {Yingying Li and Jianfeng Ma and Yinbin Miao and Liming Liu and Ximeng Liu and Kim{-}Kwang Raymond Choo}, title = {Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {8}, pages = {5348--5359}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3032147}, doi = {10.1109/TII.2020.3032147}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/LiMMLLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/PeiYWCWW21, author = {Xinyue Pei and Hua Yu and Xiaojie Wang and Yingyang Chen and Miaowen Wen and Yik{-}Chung Wu}, title = {NOMA-Based Pervasive Edge Computing: Secure Power Allocation for IoV}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {7}, pages = {5021--5030}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3001955}, doi = {10.1109/TII.2020.3001955}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/PeiYWCWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/WangCHZG21, author = {Xiaolin Wang and Cailian Chen and Jianping He and Shanying Zhu and Xinping Guan}, title = {Learning-Based Online Transmission Path Selection for Secure Estimation in Edge Computing Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {5}, pages = {3577--3587}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3012090}, doi = {10.1109/TII.2020.3012090}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/WangCHZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhangWHZXX21, author = {Yushu Zhang and Ping Wang and Hui Huang and Youwen Zhu and Di Xiao and Yong Xiang}, title = {Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial Big Image Data Processing in Fog Computing}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {5}, pages = {3401--3411}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3008914}, doi = {10.1109/TII.2020.3008914}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhangWHZXX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhangWTSX21, author = {Tengyue Zhang and Hong Wen and Jie Tang and Huanhuan Song and FeiYi Xie}, title = {Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided by Edge Computing Intelligent Node Selection}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {7}, pages = {4999--5009}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3017767}, doi = {10.1109/TII.2020.3017767}, timestamp = {Tue, 24 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhangWTSX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LiaoMZSWP21, author = {Haijun Liao and Yansong Mu and Zhenyu Zhou and Meng Sun and Zhao Wang and Chao Pan}, title = {Blockchain and Learning-Based Secure and Intelligent Task Offloading for Vehicular Fog Computing}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {7}, pages = {4051--4063}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.3007770}, doi = {10.1109/TITS.2020.3007770}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/LiaoMZSWP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/SharmaP21, author = {Pradip Kumar Sharma and Jong Hyuk Park}, title = {Blockchain-Based Secure Mist Computing Network Architecture for Intelligent Transportation Systems}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {8}, pages = {5168--5177}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.3040989}, doi = {10.1109/TITS.2020.3040989}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/SharmaP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/XuHZSZQB21, author = {Xiaolong Xu and Qihe Huang and Haibin Zhu and Suraj Sharma and Xuyun Zhang and Lianyong Qi and Md. Zakirul Alam Bhuiyan}, title = {Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {6}, pages = {3720--3729}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.3034197}, doi = {10.1109/TITS.2020.3034197}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/XuHZSZQB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ChaLAKK21, author = {Myung{-}Hoon Cha and Sangmin Lee and Baik{-}Song An and Hong{-}Yeon Kim and Kang{-}Ho Kim}, title = {Fast and secure Global-Heap for memory-centric computing}, journal = {J. Supercomput.}, volume = {77}, number = {11}, pages = {13262--13291}, year = {2021}, url = {https://doi.org/10.1007/s11227-021-03806-4}, doi = {10.1007/S11227-021-03806-4}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ChaLAKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/HammamiYO21, author = {Hamza Hammami and Sadok Ben Yahia and Mohammad S. Obaidat}, title = {A lightweight anonymous authentication scheme for secure cloud computing services}, journal = {J. Supercomput.}, volume = {77}, number = {2}, pages = {1693--1713}, year = {2021}, url = {https://doi.org/10.1007/s11227-020-03313-y}, doi = {10.1007/S11227-020-03313-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/HammamiYO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/MansouriJZ21, author = {Najme Mansouri and Mohammad Masoud Javidi and Behnam Mohammad Hasani Zade}, title = {A CSO-based approach for secure data replication in cloud computing environment}, journal = {J. Supercomput.}, volume = {77}, number = {6}, pages = {5882--5933}, year = {2021}, url = {https://doi.org/10.1007/s11227-020-03497-3}, doi = {10.1007/S11227-020-03497-3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/MansouriJZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/HuangZY21, author = {Qinlong Huang and Zhicheng Zhang and Yixian Yang}, title = {Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {20}, number = {5}, pages = {1951--1964}, year = {2021}, url = {https://doi.org/10.1109/TMC.2020.2970705}, doi = {10.1109/TMC.2020.2970705}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/HuangZY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/WangYHYWZ21, author = {Siming Wang and Dongdong Ye and Xumin Huang and Rong Yu and Yongjian Wang and Yan Zhang}, title = {Consortium Blockchain for Secure Resource Sharing in Vehicular Edge Computing: {A} Contract-Based Approach}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {2}, pages = {1189--1201}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.3004475}, doi = {10.1109/TNSE.2020.3004475}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/WangYHYWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/XiaWTXW21, author = {Zhihua Xia and Lan Wang and Jian Tang and Neal N. Xiong and Jian Weng}, title = {A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {1}, pages = {318--330}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.3038218}, doi = {10.1109/TNSE.2020.3038218}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/XiaWTXW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/LiuCXY21, author = {Xuejiao Liu and Wei Chen and Yingjie Xia and Chenghan Yang}, title = {{SE-VFC:} Secure and Efficient Outsourcing Computing in Vehicular Fog Computing}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {3}, pages = {3389--3399}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2021.3080138}, doi = {10.1109/TNSM.2021.3080138}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/LiuCXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/LiuPWWW21, author = {Qin Liu and Yu Peng and Jie Wu and Tian Wang and Guojun Wang}, title = {Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {18}, number = {2}, pages = {2046--2062}, year = {2021}, url = {https://doi.org/10.1109/TNSM.2020.3045467}, doi = {10.1109/TNSM.2020.3045467}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/LiuPWWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/AlizadehTSAJ21, author = {Mojtaba Alizadeh and Mohammad Hesam Tadayon and Kouichi Sakurai and Hiroaki Anada and Alireza Jolfaei}, title = {A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Networks in Volunteer Computing}, journal = {{ACM} Trans. Internet Techn.}, volume = {21}, number = {4}, pages = {82:1--82:16}, year = {2021}, url = {https://doi.org/10.1145/3407189}, doi = {10.1145/3407189}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/AlizadehTSAJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/AsheralievaN21, author = {Alia Asheralieva and Dusit Niyato}, title = {Fast and Secure Computational Offloading With Lagrange Coded Mobile Edge Computing}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {5}, pages = {4924--4942}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3070723}, doi = {10.1109/TVT.2021.3070723}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/AsheralievaN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LuoLCM21, author = {Xuewen Luo and Yiliang Liu and Hsiao{-}Hwa Chen and Weixiao Meng}, title = {Artificial Noise Assisted Secure Mobile Crowd Computing in Intelligently Connected Vehicular Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {8}, pages = {7637--7651}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3087399}, doi = {10.1109/TVT.2021.3087399}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/LuoLCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/webology/AnoopS21a, author = {S. Anoop and J. Amar Pratap Singh}, title = {A {LSTM} Approach for Secure Energy Efficient Computational Offloading in Mobile Edge Computing}, journal = {Webology}, volume = {18}, number = {2}, pages = {856--874}, year = {2021}, url = {https://doi.org/10.14704/web/v18i2/web18359}, doi = {10.14704/WEB/V18I2/WEB18359}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/webology/AnoopS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/webology/HassanAKSA21, author = {Mohammad Hassan and Feras A. Alnaimait and Qasem Kharma and Ashraf Sharah and Khalil Al{-}Shqeerat}, title = {Secure Group Key Management Protocol for Grid Computing}, journal = {Webology}, volume = {18}, number = {2}, pages = {1055--1065}, year = {2021}, url = {https://doi.org/10.14704/web/v18i2/web18374}, doi = {10.14704/WEB/V18I2/WEB18374}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/webology/HassanAKSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wias/Wu21, author = {Weiwei Wu}, title = {A secure encryption method of communication channel based on cloud computing technology}, journal = {Web Intell.}, volume = {19}, number = {3}, pages = {239--251}, year = {2021}, url = {https://doi.org/10.3233/WEB-210470}, doi = {10.3233/WEB-210470}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wias/Wu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LeeKLW21, author = {Hakjun Lee and Dongwoo Kang and Youngsook Lee and Dongho Won}, title = {Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {2098530:1--2098530:20}, year = {2021}, url = {https://doi.org/10.1155/2021/2098530}, doi = {10.1155/2021/2098530}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/LeeKLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LuoWX21, author = {Hongwei Luo and Feifei Wang and Guoai Xu}, title = {Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2021}, pages = {8848032:1--8848032:12}, year = {2021}, url = {https://doi.org/10.1155/2021/8848032}, doi = {10.1155/2021/8848032}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/LuoWX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigcomp/KimLC21, author = {Hyeong{-}Jin Kim and Hyeon{-}Jo Lee and Jae{-}Woo Chang}, editor = {Herwig Unger and Jinho Kim and U Kang and Chakchai So{-}In and Junping Du and Walid Saad and Young{-}Guk Ha and Christian Wagner and Julien Bourgeois and Chanboon Sathitwiriyawong and Hyuk{-}Yoon Kwon and Carson K. Leung}, title = {A Secure and Efficient Query Processing Algorithm Over Encrypted Database in Cloud Computing}, booktitle = {{IEEE} International Conference on Big Data and Smart Computing, BigComp 2021, Jeju Island, South Korea, January 17-20, 2021}, pages = {219--225}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigComp51126.2021.00049}, doi = {10.1109/BIGCOMP51126.2021.00049}, timestamp = {Thu, 15 Jul 2021 15:42:38 +0200}, biburl = {https://dblp.org/rec/conf/bigcomp/KimLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/GrafbergerCJGG21, author = {Andreas Grafberger and Mohak Chadha and Anshul Jindal and Jianfeng Gu and Michael Gerndt}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {FedLess: Secure and Scalable Federated Learning Using Serverless Computing}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {164--173}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9672067}, doi = {10.1109/BIGDATA52589.2021.9672067}, timestamp = {Fri, 13 Jan 2023 17:06:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/GrafbergerCJGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/case/GiehlHB21, author = {Alexander Giehl and Michael P. Heinl and Maximilian Busch}, title = {Leveraging Edge Computing and Differential Privacy to Securely Enable Industrial Cloud Collaboration Along the Value Chain}, booktitle = {17th {IEEE} International Conference on Automation Science and Engineering, {CASE} 2021, Lyon, France, August 23-27, 2021}, pages = {2023--2028}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CASE49439.2021.9551656}, doi = {10.1109/CASE49439.2021.9551656}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/case/GiehlHB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccoms/ZhangFCLC21, author = {Zheng Zhang and Yongwei Fu and Gang Cheng and Xiaolong Lan and Qingchun Chen}, title = {Secure Offloading Design in Multi-user Mobile-Edge Computing Systems}, booktitle = {6th {IEEE} International Conference on Computer and Communication Systems, {ICCCS} 2021, Chengdu, China, April 23-26, 2021}, pages = {695--703}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCS52626.2021.9449190}, doi = {10.1109/ICCCS52626.2021.9449190}, timestamp = {Wed, 28 Jul 2021 08:35:29 +0200}, biburl = {https://dblp.org/rec/conf/ccoms/ZhangFCLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/AldawoodJF21a, author = {Mansour Aldawood and Arshad Jhumka and Suhaib A. Fahmy}, editor = {Donald Ferguson and Markus Helfert and Claus Pahl}, title = {Toward Secure VMs Allocation: Analysis of VMs Allocation Behaviours in the Cloud Computing Environments}, booktitle = {Cloud Computing and Services Science - 11th International Conference, {CLOSER} 2021, Virtual Event, April 28-30, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1607}, pages = {25--46}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-21637-4\_2}, doi = {10.1007/978-3-031-21637-4\_2}, timestamp = {Tue, 07 Mar 2023 16:01:53 +0100}, biburl = {https://dblp.org/rec/conf/closer/AldawoodJF21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cogmi/SchmidtSBNASM21, author = {Hendrik F. R. Schmidt and J{\"{o}}rg Schl{\"{o}}tterer and Marcel Bargull and Enrico Nasca and Ryan Aydelott and Christin Seifert and Folker Meyer}, title = {Towards a trustworthy, secure and reliable enclave for machine learning in a hospital setting: The Essen Medical Computing Platform {(EMCP)}}, booktitle = {Third {IEEE} International Conference on Cognitive Machine Intelligence, CogMI 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {116--123}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CogMI52975.2021.00023}, doi = {10.1109/COGMI52975.2021.00023}, timestamp = {Wed, 20 Apr 2022 16:01:05 +0200}, biburl = {https://dblp.org/rec/conf/cogmi/SchmidtSBNASM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/SardarBRS21, author = {Laltu Sardar and Gaurav Bansal and Sushmita Ruj and Kouichi Sakurai}, title = {Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data}, booktitle = {13th International Conference on COMmunication Systems {\&} NETworkS, {COMSNETS} 2021, Bangalore, India, January 5-9, 2021}, pages = {465--473}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/COMSNETS51098.2021.9352809}, doi = {10.1109/COMSNETS51098.2021.9352809}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/SardarBRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BagheryGOST21, author = {Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy}, editor = {Kenneth G. Paterson}, title = {Compilation of Function Representations for Secure Computing Paradigms}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {26--50}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_2}, doi = {10.1007/978-3-030-75539-3\_2}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BagheryGOST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/DessoukyIKMMSSZ21, author = {Ghada Dessouky and Mihailo Isakov and Michel A. Kinsy and Pouya Mahmoody and Miguel Mark and Ahmad{-}Reza Sadeghi and Emmanuel Stapf and Shaza Zeitouni}, title = {Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures}, booktitle = {58th {ACM/IEEE} Design Automation Conference, {DAC} 2021, San Francisco, CA, USA, December 5-9, 2021}, pages = {985--990}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DAC18074.2021.9586222}, doi = {10.1109/DAC18074.2021.9586222}, timestamp = {Fri, 12 Nov 2021 12:31:50 +0100}, biburl = {https://dblp.org/rec/conf/dac/DessoukyIKMMSSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/YinZF21, author = {Jiaqi Yin and Huibiao Zhu and Yuan Fei}, title = {{SC4MEC:} Automated Implementation of {A} Secure Hierarchical Calculus for Mobile Edge Computing}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2021, Grenoble, France, February 1-5, 2021}, pages = {990--993}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/DATE51398.2021.9474184}, doi = {10.23919/DATE51398.2021.9474184}, timestamp = {Wed, 21 Jul 2021 10:04:34 +0200}, biburl = {https://dblp.org/rec/conf/date/YinZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/WuLDLZG21, author = {Songqi Wu and Jin Li and Fenghui Duan and Yueming Lu and Xu Zhang and Jiefu Gan}, title = {The Survey on the development of Secure Multi-Party Computing in the blockchain}, booktitle = {Sixth {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2021, Shenzhen, China, October 9-11, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC53577.2021.00008}, doi = {10.1109/DSC53577.2021.00008}, timestamp = {Fri, 22 Apr 2022 19:18:38 +0200}, biburl = {https://dblp.org/rec/conf/dsc/WuLDLZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eucnc/RiggioCLJMGRSP21, author = {Roberto Riggio and Estefan{\'{\i}}a Coronado and Neiva Linder and Jovanka Adzic and Gianpiero Mastinu and Leonardo Goratti and Miguel Rosa and Hans D. Schotten and Marco Pistore}, title = {AI@EDGE: {A} Secure and Reusable Artificial Intelligence Platform for Edge Computing}, booktitle = {Joint European Conference on Networks and Communications {\&} 6G Summit, EuCNC/6G Summit 2021, Porto, Portugal, June 8-11, 2021}, pages = {610--615}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482440}, doi = {10.1109/EUCNC/6GSUMMIT51104.2021.9482440}, timestamp = {Thu, 16 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eucnc/RiggioCLJMGRSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmec/AhmedBJJ21, author = {Monjur Ahmed and Md. Mahabub Alam Bhuiyan and Sapna Jaidka and Peerumporn Jiranantanagorn}, title = {A Decentralised Mechanism for Secure Cloud Computing Transactions}, booktitle = {Sixth International Conference on Fog and Mobile Edge Computing, {FMEC} 2021, Gandia, Spain, December 6-9, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/FMEC54266.2021.9732405}, doi = {10.1109/FMEC54266.2021.9732405}, timestamp = {Mon, 21 Mar 2022 18:09:54 +0100}, biburl = {https://dblp.org/rec/conf/fmec/AhmedBJJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuAKNR21, author = {Shaoliang Zhu and Alia Asheralieva and Md. Monjurul Karim and Dusit Niyato and Khuhawar Arif Raza}, title = {Secure Federated Learning Based on Coded Distributed Computing}, booktitle = {{IEEE} Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021}, pages = {1--7}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/GCWkshps52748.2021.9682063}, doi = {10.1109/GCWKSHPS52748.2021.9682063}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/ZhuAKNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccbdc/Shiraishi21, author = {Momoko Shiraishi}, title = {Secure Big Data Management based on Secret Sharing and Verifiable Computing}, booktitle = {{ICCBDC} 2021: 5th International Conference on Cloud and Big Data Computing, Liverpool, United Kingdom, August 13 - 15, 2021}, pages = {21--25}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3481646.3481650}, doi = {10.1145/3481646.3481650}, timestamp = {Thu, 02 Dec 2021 10:56:03 +0100}, biburl = {https://dblp.org/rec/conf/iccbdc/Shiraishi21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LiZXT21, author = {Yun Li and Xuefei Zhang and Xiaodong Xu and Xiaofeng Tao}, title = {Secure network slicing deployment in edge computing}, booktitle = {10th {IEEE/CIC} International Conference on Communications in China, {ICCC} 2021, Xiamen, China, July 28-30, 2021}, pages = {97--102}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCC52777.2021.9580199}, doi = {10.1109/ICCC52777.2021.9580199}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/LiZXT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/NairJG21, author = {Nidhi Nair and Tanuj Jain and Mihir Gada}, title = {Secured File Storage in Cloud Computing Application: Secura-Drive}, booktitle = {12th International Conference on Computing Communication and Networking Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCCNT51525.2021.9580145}, doi = {10.1109/ICCCNT51525.2021.9580145}, timestamp = {Thu, 25 Nov 2021 09:08:41 +0100}, biburl = {https://dblp.org/rec/conf/icccnt/NairJG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YuY0Z21, author = {Zhaofeng Yu and Lin Ye and Hongli Zhang and Dongyang Zhan}, editor = {Xingming Sun and Xiaorui Zhang and Zhihua Xia and Elisa Bertino}, title = {A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing}, booktitle = {Artificial Intelligence and Security - 7th International Conference, {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12737}, pages = {102--111}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78612-0\_8}, doi = {10.1007/978-3-030-78612-0\_8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YuY0Z21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse2/Zong21, author = {Zhong Zong}, title = {Research on The secure Transmission Method of Cloud Computing Data}, booktitle = {16th International Conference on Computer Science {\&} Education, {ICCSE} 2021, Lancaster, United Kingdom, August 17-21, 2021}, pages = {329--332}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICCSE51940.2021.9569731}, doi = {10.1109/ICCSE51940.2021.9569731}, timestamp = {Wed, 03 Nov 2021 16:14:37 +0100}, biburl = {https://dblp.org/rec/conf/iccse2/Zong21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icict/ShuklaTB21, author = {Saurabh Shukla and Subhasis Thakur and John G. Breslin}, editor = {Xin{-}She Yang and Simon Sherratt and Nilanjan Dey and Amit Joshi}, title = {Secure Data Transmission in Smart Meters Using Q-Learning in Fog Computing Environment}, booktitle = {Proceedings of Sixth International Congress on Information and Communication Technology - {ICICT} 2021, London, Volume 3}, series = {Lecture Notes in Networks and Systems}, volume = {216}, pages = {667--678}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-1781-2\_58}, doi = {10.1007/978-981-16-1781-2\_58}, timestamp = {Wed, 04 May 2022 17:52:23 +0200}, biburl = {https://dblp.org/rec/conf/icict/ShuklaTB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/0002LWLL21, author = {Yang Shi and Mianhong Li and Wujing Wei and Yangyang Liu and Xiapu Luo}, editor = {Zhi Jin and Xuandong Li and Jianwen Xiang and Leonardo Mariani and Ting Liu and Xiao Yu and Nahgmeh Ivaki}, title = {Secure and Efficient White-box Encryption Scheme for Data Protection against Shared Cache Attacks in Cloud Computing}, booktitle = {32nd {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021, Wuhan, China, October 25-28, 2021}, pages = {446--456}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSRE52982.2021.00053}, doi = {10.1109/ISSRE52982.2021.00053}, timestamp = {Tue, 20 Aug 2024 07:54:45 +0200}, biburl = {https://dblp.org/rec/conf/issre/0002LWLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ist/PraveenSMK21, author = {S. Phani Praveen and S. Sindhura and A. Madhuri and Dimitrios A. Karras}, title = {A Novel Effective Framework for Medical Images Secure Storage Using Advanced Cipher Text Algorithm in Cloud Computing}, booktitle = {{IEEE} International Conference on Imaging Systems and Techniques, {IST} 2021, Kaohsiung, Taiwan, August 24-26, 2021}, pages = {1--4}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IST50367.2021.9651475}, doi = {10.1109/IST50367.2021.9651475}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ist/PraveenSMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/Kamoun-AbidRMZ21, author = {Ferdaous Kamoun{-}Abid and Malek Rekik and Amel Meddeb{-}Makhlouf and Faouzi Zarai}, editor = {Jaroslaw Watr{\'{o}}bski and Wojciech Salabun and Carlos Toro and Cecilia Zanni{-}Merk and Robert J. Howlett and Lakhmi C. Jain}, title = {Secure architecture for Cloud/Fog computing based on firewalls and controllers}, booktitle = {Knowledge-Based and Intelligent Information {\&} Engineering Systems: Proceedings of the 25th International Conference KES-2021, Virtual Event / Szczecin, Poland, 8-10 September 2021}, series = {Procedia Computer Science}, volume = {192}, pages = {822--833}, publisher = {Elsevier}, year = {2021}, url = {https://doi.org/10.1016/j.procs.2021.08.085}, doi = {10.1016/J.PROCS.2021.08.085}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kes/Kamoun-AbidRMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mipro/NovkovicBGG21, author = {Bojan Novkovic and Anita Bozic and Marin Golub and Stjepan Gros}, editor = {Marko Koricic and Karolj Skala and Zeljka Car and Marina Cicin{-}Sain and Snjezana Babic and Vlado Sruk and Dejan Skvorc and Slobodan Ribaric and Bojan Jerbic and Stjepan Gros and Boris Vrdoljak and Mladen Mauher and Edvard Tijan and Tihomir Katulic and Juraj Petrovic and Tihana Galinac Grbac and Nikola Filip Fijan and Vera Gradisnik}, title = {Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment}, booktitle = {44th International Convention on Information, Communication and Electronic Technology, {MIPRO} 2021, Opatija, Croatia, September 27 - Oct. 1, 2021}, pages = {1213--1218}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.23919/MIPRO52101.2021.9597198}, doi = {10.23919/MIPRO52101.2021.9597198}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mipro/NovkovicBGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobisec2/ZhaoHZZ21, author = {Yan Zhao and Ning Hu and Jincai Zou and Yuqiang Zhang}, editor = {Ilsun You and Hwankuk Kim and Taek{-}Young Youn and Francesco Palmieri and Igor V. Kotenko}, title = {A Secure Dispersed Computing Scheme for Internet of Mobile Things}, booktitle = {Mobile Internet Security - 5th International Symposium, MobiSec 2021, Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1544}, pages = {65--78}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-16-9576-6\_6}, doi = {10.1007/978-981-16-9576-6\_6}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobisec2/ZhaoHZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/HanTDSZL21, author = {Xu Han and Daxin Tian and Xuting Duan and Zhengguo Sheng and Jianshan Zhou and Victor C. M. Leung}, editor = {Mirela Notare and Peng Sun}, title = {A Dual Mode Privacy-Preserving Scheme Enabled Secure and Anonymous for Edge Computing Assisted Internet of Vehicle Networks}, booktitle = {DIVANet '21: Proceedings of the 11th {ACM} Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, Alicante, Spain, November 22 - 26, 2021}, pages = {65--70}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3479243.3487310}, doi = {10.1145/3479243.3487310}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mswim/HanTDSZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/MatosRT21, author = {Filipe Fernandes S. B. de Matos and Paulo A. L. Rego and Fernando A. M. Trinta}, editor = {Mirela Notare and Peng Sun}, title = {Secure Computational Offloading with gRPC: {A} Performance Evaluation in a Mobile Cloud Computing Environment}, booktitle = {DIVANet '21: Proceedings of the 11th {ACM} Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, Alicante, Spain, November 22 - 26, 2021}, pages = {45--52}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3479243.3487295}, doi = {10.1145/3479243.3487295}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mswim/MatosRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/ManikandanSCS21, author = {Saravanan Manikandan and Islam M. D. Saikhul and Hsing{-}Chung Chen and Yu{-}Lin Song}, editor = {Leonard Barolli and Hsing{-}Chung Chen and Tomoya Enokido}, title = {Secure Cloud Storage Using Color Code in {DNA} Computing}, booktitle = {Advances in Networked-Based Information Systems - The 24th International Conference on Network-Based Information Systems (NBiS-2021), Taichung, Taiwan, 1-3 September, 2021}, series = {Lecture Notes in Networks and Systems}, volume = {313}, pages = {105--116}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84913-9\_10}, doi = {10.1007/978-3-030-84913-9\_10}, timestamp = {Thu, 12 Aug 2021 13:43:08 +0200}, biburl = {https://dblp.org/rec/conf/nbis/ManikandanSCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PolinskyD0E21, author = {Isaac Polinsky and Pubali Datta and Adam Bates and William Enck}, editor = {Jorge Lobo and Roberto Di Pietro and Omar Chowdhury and Hongxin Hu}, title = {{SCIFFS:} Enabling Secure Third-Party Security Analytics using Serverless Computing}, booktitle = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021}, pages = {175--186}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3450569.3463567}, doi = {10.1145/3450569.3463567}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/PolinskyD0E21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sirocco/Rajsbaum21, author = {Sergio Rajsbaum}, editor = {Tomasz Jurdzinski and Stefan Schmid}, title = {A Distributed Computing Perspective of Unconditionally Secure Information Transmission in Russian Cards Problems}, booktitle = {Structural Information and Communication Complexity - 28th International Colloquium, {SIROCCO} 2021, Wroc{\l}aw, Poland, June 28 - July 1, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12810}, pages = {277--295}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-79527-6\_16}, doi = {10.1007/978-3-030-79527-6\_16}, timestamp = {Tue, 22 Jun 2021 16:58:40 +0200}, biburl = {https://dblp.org/rec/conf/sirocco/Rajsbaum21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcom/LiCXWLWWW21, author = {He Li and Rongqiang Cao and Hanwen Xiu and Meng Wan and Kai Li and Xiaoguang Wang and Yangang Wang and Jue Wang}, editor = {Meikang Qiu and Keke Gai and Han Qiu}, title = {Secure Shell Remote Access for Virtualized Computing Environment}, booktitle = {Smart Computing and Communication - 6th International Conference, SmartCom 2021, New York City, NY, USA, December 29-31, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13202}, pages = {123--132}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97774-0\_11}, doi = {10.1007/978-3-030-97774-0\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartcom/LiCXWLWWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Balasubramanian21, author = {Venki Balasubramanian and Rehena Sulthana and Andrew Stranieri and G. Manoharan and Teena Arora and Ram Srinivasan and K. Mahalakshmi and Varun G. Menon}, title = {A Secured Real-Time IoMT Application for Monitoring Isolated {COVID-19} Patients using Edge Computing}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {1227--1234}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00167}, doi = {10.1109/TRUSTCOM53373.2021.00167}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Balasubramanian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Cheng0WG21, author = {Cong Cheng and Lingzhi Li and Jin Wang and Fei Gu}, title = {The Design and Implementation of Secure Distributed Image Classification Reasoning System for Heterogeneous Edge Computing}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {250--257}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00049}, doi = {10.1109/TRUSTCOM53373.2021.00049}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/Cheng0WG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/CuiWZL021, author = {Mingyue Cui and Jin Wang and Jingya Zhou and Kejie Lu and Jianping Wang}, title = {The Design of Secure Coded Edge Computing for User-Edge Collaborative Computing}, booktitle = {20th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021}, pages = {224--231}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TrustCom53373.2021.00046}, doi = {10.1109/TRUSTCOM53373.2021.00046}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/CuiWZL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/TeseiLP021, author = {Andrea Tesei and Marco Luise and Paolo Pagano and Joaquim Ferreira}, title = {Secure Multi-access Edge Computing Assisted Maneuver Control for Autonomous Vehicles}, booktitle = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki, Finland, April 25-28, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9449087}, doi = {10.1109/VTC2021-SPRING51267.2021.9449087}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/TeseiLP021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/GuZG21, author = {Xiaohui Gu and Guoan Zhang and Jinyuan Gu}, title = {Offloading Optimization for Energy-Minimization Secure UAV-Edge-Computing Systems}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021, Nanjing, China, March 29 - April 1, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WCNC49053.2021.9417527}, doi = {10.1109/WCNC49053.2021.9417527}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/GuZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/SunLT21, author = {Yang Sun and Na Li and Xiaofeng Tao}, title = {Privacy Preserved Secure Offloading in the Multi-access Edge Computing Network}, booktitle = {{IEEE} Wireless Communications and Networking Conference Workshops, {WCNC} Workshops 2021, Nanjing, China, March 29, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WCNCW49093.2021.9419987}, doi = {10.1109/WCNCW49093.2021.9419987}, timestamp = {Sun, 19 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/SunLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/Yao0WXY21, author = {Jiming Yao and Wei Wang and Peng Wu and Ningzhe Xing and Chun Yang}, title = {A Secure Data Transmission Method for Power 5G Edge Computing Scenarios}, booktitle = {13th International Conference on Wireless Communications and Signal Processing, {WCSP} 2021, Changsha, China, October 20-22, 2021}, pages = {1--5}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/WCSP52459.2021.9613302}, doi = {10.1109/WCSP52459.2021.9613302}, timestamp = {Wed, 08 Dec 2021 09:34:06 +0100}, biburl = {https://dblp.org/rec/conf/wcsp/Yao0WXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mc/21/0001L21, author = {Can Liu and Janne Lindqvist}, editor = {Parisa Eslambolchilar and Andreas Komninos and Mark D. Dunlop}, title = {Secure Gestures - Case Study 4}, booktitle = {Intelligent Computing for Interactive System Design: Statistics, Digital Signal Processing, and Machine Learning in Practice}, pages = {323--338}, publisher = {{ACM} / Morgan {\&} Claypool}, year = {2021}, url = {https://doi.org/10.1145/3447404.3447422}, doi = {10.1145/3447404.3447422}, timestamp = {Tue, 10 Aug 2021 12:21:03 +0200}, biburl = {https://dblp.org/rec/books/mc/21/0001L21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/mc/21/McMenemy21h, author = {David McMenemy}, editor = {Parisa Eslambolchilar and Andreas Komninos and Mark D. Dunlop}, title = {Ethics and Secure Gestures}, booktitle = {Intelligent Computing for Interactive System Design: Statistics, Digital Signal Processing, and Machine Learning in Practice}, pages = {339--340}, publisher = {{ACM} / Morgan {\&} Claypool}, year = {2021}, url = {https://doi.org/10.1145/3447404.3447423}, doi = {10.1145/3447404.3447423}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/mc/21/McMenemy21h.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dasc/2021, title = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy52372.2021}, doi = {10.1109/DASC/PICOM/CBDCOM/CY52372.2021}, isbn = {978-1-6654-2174-4}, timestamp = {Wed, 23 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2021, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021, Aizuwakamatsu, Japan, January 30 - February 2, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSC49826.2021}, doi = {10.1109/DSC49826.2021}, isbn = {978-1-7281-7534-8}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-01264, author = {Nadya Bliss and Lawrence A. Gordon and Daniel Lopresti and Fred Schneider and Suresh Venkatasubramanian}, title = {A Research Ecosystem for Secure Computing}, journal = {CoRR}, volume = {abs/2101.01264}, year = {2021}, url = {https://arxiv.org/abs/2101.01264}, eprinttype = {arXiv}, eprint = {2101.01264}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-01264.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-00378, author = {Deeksha Dangwal and Meghan Cowan and Armin Alaghi and Vincent T. Lee and Brandon Reagen and Caroline Trippel}, title = {SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing}, journal = {CoRR}, volume = {abs/2105.00378}, year = {2021}, url = {https://arxiv.org/abs/2105.00378}, eprinttype = {arXiv}, eprint = {2105.00378}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-00378.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-12958, author = {Tingting Tang and Ramy E. Ali and Hanieh Hashemi and Tynan Gangwani and Salman Avestimehr and Murali Annavaram}, title = {Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning}, journal = {CoRR}, volume = {abs/2107.12958}, year = {2021}, url = {https://arxiv.org/abs/2107.12958}, eprinttype = {arXiv}, eprint = {2107.12958}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-12958.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-00469, author = {Ling He and Miaowen Wen and Yingyang Chen and Bingli Jiao}, title = {Delay Aware Secure Offloading for NOMA-Assisted Mobile Edge Computing in Internet of Vehicles}, journal = {CoRR}, volume = {abs/2108.00469}, year = {2021}, url = {https://arxiv.org/abs/2108.00469}, eprinttype = {arXiv}, eprint = {2108.00469}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-00469.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-03994, author = {Carolyn Ellis and Matthew Route and Christopher Phillips and Nicholas Smith and Alex Younts}, title = {Cloud to Ground Secured Computing: User Experiences on the Transition from Cloud-Based to Locally-Sited Hardware}, journal = {CoRR}, volume = {abs/2108.03994}, year = {2021}, url = {https://arxiv.org/abs/2108.03994}, eprinttype = {arXiv}, eprint = {2108.03994}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-03994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-02952, author = {Yao Ma and Elham Kashefi and Myrto Arapinis and Kaushik Chakraborty and Marc Kaplan}, title = {QEnclave - {A} practical solution for secure quantum cloud computing}, journal = {CoRR}, volume = {abs/2109.02952}, year = {2021}, url = {https://arxiv.org/abs/2109.02952}, eprinttype = {arXiv}, eprint = {2109.02952}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02952.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-04457, author = {Hanif Deylami and Jairo A. Guti{\'{e}}rrez and Roopak Sinha}, title = {Tailoring the Cyber Security Framework: How to Overcome the Complexities of Secure Live Virtual Machine Migration in Cloud Computing}, journal = {CoRR}, volume = {abs/2110.04457}, year = {2021}, url = {https://arxiv.org/abs/2110.04457}, eprinttype = {arXiv}, eprint = {2110.04457}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-04457.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-15161, author = {Qing Yang and Hao Wang and Xiaoxiao Wu and Taotao Wang and Shengli Zhang and Naijin Liu}, title = {Secure Blockchain Platform for Industrial IoT with Trusted Computing Hardware}, journal = {CoRR}, volume = {abs/2110.15161}, year = {2021}, url = {https://arxiv.org/abs/2110.15161}, eprinttype = {arXiv}, eprint = {2110.15161}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-15161.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-03396, author = {Andreas Grafberger and Mohak Chadha and Anshul Jindal and Jianfeng Gu and Michael Gerndt}, title = {FedLess: Secure and Scalable Federated Learning Using Serverless Computing}, journal = {CoRR}, volume = {abs/2111.03396}, year = {2021}, url = {https://arxiv.org/abs/2111.03396}, eprinttype = {arXiv}, eprint = {2111.03396}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-03396.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-07672, author = {Poornima Mahadevappa and Raja Kumar Murugesan}, title = {A Data Quarantine Model to Secure Data in Edge Computing}, journal = {CoRR}, volume = {abs/2111.07672}, year = {2021}, url = {https://arxiv.org/abs/2111.07672}, eprinttype = {arXiv}, eprint = {2111.07672}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-07672.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BagheryGOST21, author = {Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy}, title = {Compilation of Function Representations for Secure Computing Paradigms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2021}, url = {https://eprint.iacr.org/2021/195}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BagheryGOST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JinKNRSW21, author = {Weizhao Jin and Bhaskar Krishnamachari and Muhammad Naveed and Srivatsan Ravi and Eduard Sanou and Kwame{-}Lante Wright}, title = {Secure Publish-Process-Subscribe System for Dispersed Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1668}, year = {2021}, url = {https://eprint.iacr.org/2021/1668}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JinKNRSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/AnoopS21, title = {Multi-user energy efficient secured framework with dynamic resource allocation policy for mobile edge network computing}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {12}, number = {7}, pages = {7317--7332}, year = {2021}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s12652-020-02407-y}, doi = {10.1007/S12652-020-02407-Y}, timestamp = {Wed, 13 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/AnoopS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Ning20, author = {Rui Ning}, title = {Secure Mobile Computing by Using Convolutional and Capsule Deep Neural Networks}, school = {Old Dominion University, Norfolk, Virginia, {USA}}, year = {2020}, url = {https://digitalcommons.odu.edu/ece\_etds/219}, timestamp = {Mon, 02 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Ning20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Oppermann20, author = {Alexander Oppermann}, title = {Secure cloud computing in legal metrology}, school = {Technical University of Berlin, Germany}, year = {2020}, url = {https://nbn-resolving.org/urn:nbn:de:101:1-2020031100583986700843}, urn = {urn:nbn:de:101:1-2020031100583986700843}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Oppermann20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/AlJumyli20, author = {Waleed Khalid Hassan Al{-}Jumyli}, title = {Towards secure identity-based cryptosystems for cloud computing}, school = {University of Buckingham, {UK}}, year = {2020}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.848571}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/AlJumyli20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Liu20e, author = {Renju Liu}, title = {Secure and Safe Edge Computing for the Internet-of-Things}, school = {University of California, Los Angeles, {USA}}, year = {2020}, url = {https://www.escholarship.org/uc/item/9mm449dt}, timestamp = {Wed, 12 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Liu20e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JiangY20, author = {Mingfang Jiang and Hengfu Yang}, title = {Secure Outsourcing Algorithm of {BTC} Feature Extraction in Cloud Computing}, journal = {{IEEE} Access}, volume = {8}, pages = {106958--106967}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3000683}, doi = {10.1109/ACCESS.2020.3000683}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/JiangY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/JinXYHK20, author = {Wenquan Jin and Rongxu Xu and Taewan You and Yong{-}Geun Hong and Dohyeun Kim}, title = {Secure Edge Computing Management Based on Independent Microservices Providers for Gateway-Centric IoT Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {187975--187990}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3030297}, doi = {10.1109/ACCESS.2020.3030297}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/JinXYHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiCKRBSV20, author = {Junxia Li and Jinjin Cai and Fazlullah Khan and Ateeq Ur Rehman and Venki Balasubramaniam and Jiangfeng Sun and P. Venu}, title = {A Secured Framework for SDN-Based Edge Computing in IoT-Enabled Healthcare System}, journal = {{IEEE} Access}, volume = {8}, pages = {135479--135490}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3011503}, doi = {10.1109/ACCESS.2020.3011503}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiCKRBSV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiCWLEWZ20, author = {Fengyin Li and Can Cui and Dongfeng Wang and Zhongxing Liu and Nebrase Elmrabit and Ying Wang and Huiyu Zhou}, title = {Privacy-Aware Secure Anonymous Communication Protocol in {CPSS} Cloud Computing}, journal = {{IEEE} Access}, volume = {8}, pages = {62660--62669}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2982961}, doi = {10.1109/ACCESS.2020.2982961}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiCWLEWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Liu20a, author = {Pengtao Liu}, title = {Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing}, journal = {{IEEE} Access}, volume = {8}, pages = {16750--16759}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2967457}, doi = {10.1109/ACCESS.2020.2967457}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Liu20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiuSWSW20, author = {Boyang Liu and Jiajia Song and Jin Wang and Haijian Sun and Qun Wang}, title = {Robust Secure Wireless Powered {MISO} Cognitive Mobile Edge Computing}, journal = {{IEEE} Access}, volume = {8}, pages = {62356--62366}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2984520}, doi = {10.1109/ACCESS.2020.2984520}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiuSWSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangLF20, author = {Jin Wang and Boyang Liu and Ling Feng}, title = {Secure {MISO} Cognitive-Based Mobile Edge Computing With Wireless Power Transfer}, journal = {{IEEE} Access}, volume = {8}, pages = {15518--15528}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2967221}, doi = {10.1109/ACCESS.2020.2967221}, timestamp = {Fri, 07 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangLF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangXFX20, author = {Hua Wang and Zhihua Xia and Jianwei Fei and Fengjun Xiao}, title = {An AES-Based Secure Image Retrieval Scheme Using Random Mapping and {BOW} in Cloud Computing}, journal = {{IEEE} Access}, volume = {8}, pages = {61138--61147}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2983194}, doi = {10.1109/ACCESS.2020.2983194}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangXFX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangL20e, author = {Wenjuan Zhang and Gang Li}, title = {An Efficient and Secure Data Transmission Mechanism for Internet of Vehicles Considering Privacy Protection in Fog Computing Environment}, journal = {{IEEE} Access}, volume = {8}, pages = {64461--64474}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2983994}, doi = {10.1109/ACCESS.2020.2983994}, timestamp = {Mon, 19 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangL20e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhaoTTZ20, author = {Wei Zhao and Chengliang Tian and Weizhong Tian and Yan Zhang}, title = {Securely and Efficiently Computing the Hermite Normal Form of Integer Matrices via Cloud Computing}, journal = {{IEEE} Access}, volume = {8}, pages = {137616--137630}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3011965}, doi = {10.1109/ACCESS.2020.3011965}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhaoTTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/DeebakAM20, author = {Bakkiam David Deebak and Fadi Al{-}Turjman and Leonardo Mostarda}, title = {Seamless secure anonymous authentication for cloud-based mobile edge computing}, journal = {Comput. Electr. Eng.}, volume = {87}, pages = {106782}, year = {2020}, url = {https://doi.org/10.1016/j.compeleceng.2020.106782}, doi = {10.1016/J.COMPELECENG.2020.106782}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/DeebakAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cejcs/JainN20, author = {Rachna Jain and Anand Nayyar}, title = {A novel homomorphic {RASD} framework for secured data access and storage in cloud computing}, journal = {Open Comput. Sci.}, volume = {10}, number = {1}, pages = {431--443}, year = {2020}, url = {https://doi.org/10.1515/comp-2020-0206}, doi = {10.1515/COMP-2020-0206}, timestamp = {Wed, 17 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cejcs/JainN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JiangTGJ20, author = {Jiafu Jiang and Linyu Tang and Ke Gu and Weijia Jia}, title = {Secure Computing Resource Allocation Framework For Open Fog Computing}, journal = {Comput. J.}, volume = {63}, number = {4}, pages = {567--592}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz108}, doi = {10.1093/COMJNL/BXZ108}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JiangTGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LiYW20, author = {Qizhong Li and Yizheng Yue and Zhongqi Wang}, title = {Deep Robust Cramer Shoup Delay Optimized Fully Homomorphic For {IIOT} secured transmission in cloud computing}, journal = {Comput. Commun.}, volume = {161}, pages = {10--18}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.06.017}, doi = {10.1016/J.COMCOM.2020.06.017}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LiYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/PatwaryFBNGM20, author = {Abdullah Al{-}Noman Patwary and Anmin Fu and Sudheer Kumar Battula and Ranesh Kumar Naha and Saurabh Garg and Aniket Mahanti}, title = {FogAuthChain: {A} secure location-based authentication scheme in fog computing environments using Blockchain}, journal = {Comput. Commun.}, volume = {162}, pages = {212--224}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.08.021}, doi = {10.1016/J.COMCOM.2020.08.021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/PatwaryFBNGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/ChenZSCYC20, author = {Lanxiang Chen and Nan Zhang and Hung{-}Min Sun and Chin{-}Chen Chang and Shui Yu and Kim{-}Kwang Raymond Choo}, title = {Secure search for encrypted personal health records from big data NoSQL databases in cloud}, journal = {Computing}, volume = {102}, number = {6}, pages = {1521--1545}, year = {2020}, url = {https://doi.org/10.1007/s00607-019-00762-z}, doi = {10.1007/S00607-019-00762-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/ChenZSCYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/KulkarniBS20, author = {Lalit Kulkarni and Jagdish W. Bakal and Urmila Shrawankar}, title = {Energy based incentive scheme for secure opportunistic routing in vehicular delay tolerant networks}, journal = {Computing}, volume = {102}, number = {1}, pages = {201--219}, year = {2020}, url = {https://doi.org/10.1007/s00607-019-00735-2}, doi = {10.1007/S00607-019-00735-2}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/KulkarniBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computing/SahayGM20, author = {Rashmi Sahay and G. Geethakumari and Barsha Mitra}, title = {A novel blockchain based framework to secure IoT-LLNs against routing attacks}, journal = {Computing}, volume = {102}, number = {11}, pages = {2445--2470}, year = {2020}, url = {https://doi.org/10.1007/s00607-020-00823-8}, doi = {10.1007/S00607-020-00823-8}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computing/SahayGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/WangZHCC20, author = {Shunjiang Wang and Yan Zhao and Jiang He and Rong Chen and Lina Cao}, title = {A novel data-driven intelligent computing method for the secure control of a benchmark microgrid system}, journal = {Comput. Sci. Inf. Syst.}, volume = {17}, number = {3}, pages = {835--848}, year = {2020}, url = {https://doi.org/10.2298/CSIS190912023W}, doi = {10.2298/CSIS190912023W}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsis/WangZHCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/BhatiaVS20, author = {Tarunpreet Bhatia and A. K. Verma and Gaurav Sharma}, title = {Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/cpe.5520}, doi = {10.1002/CPE.5520}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/BhatiaVS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/BJ20, author = {Benjula Anbu Malar Manickam Bernard and Prabhu Jayagopal}, title = {A distributed collaborative trust service recommender system for secure cloud computing}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {31}, number = {12}, year = {2020}, url = {https://doi.org/10.1002/ett.3991}, doi = {10.1002/ETT.3991}, timestamp = {Mon, 14 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/BJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/VerderameMMCCDM20, author = {Luca Verderame and Ivan Merelli and Lucia Morganti and Elena Corni and Daniele Cesini and Daniele D'Agostino and Alessio Merlo}, title = {A secure cloud-edges computing architecture for metagenomics analysis}, journal = {Future Gener. Comput. Syst.}, volume = {111}, pages = {919--930}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.09.013}, doi = {10.1016/J.FUTURE.2019.09.013}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/VerderameMMCCDM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hcis/ChenHDCW20, author = {Chin{-}Ling Chen and Po{-}Tsun Huang and Yong{-}Yuan Deng and Hsing{-}Chung Chen and Yun{-}Ciao Wang}, title = {A secure electronic medical record authorization system for smart device application in cloud computing environments}, journal = {Hum. centric Comput. Inf. Sci.}, volume = {10}, pages = {21}, year = {2020}, url = {https://doi.org/10.1186/s13673-020-00221-1}, doi = {10.1186/S13673-020-00221-1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hcis/ChenHDCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/AlexPJ20, author = {Sona Alex and Deepthi P. Pattathil and Dhanaraj Kakkanattu Jagalchandran}, title = {{SPCOR:} a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {6}, pages = {670--682}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2020.0086}, doi = {10.1049/IET-IFS.2020.0086}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/AlexPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Veugen20, author = {Thijs Veugen}, title = {Efficient coding for secure computing with additively-homomorphic encrypted data}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {1}, pages = {1--15}, year = {2020}, url = {https://doi.org/10.1504/IJACT.2020.107160}, doi = {10.1504/IJACT.2020.107160}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Veugen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/TianW20, author = {Jun{-}Feng Tian and Haoning Wang}, title = {An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios}, journal = {Int. J. Distributed Sens. Networks}, volume = {16}, number = {5}, year = {2020}, url = {https://doi.org/10.1177/1550147720916623}, doi = {10.1177/1550147720916623}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/TianW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijec/FatimaA20, author = {Shahin Fatima and Shish Ahmad}, title = {Secure and Effective Key Management Using Secret Sharing Schemes in Cloud Computing}, journal = {Int. J. e Collab.}, volume = {16}, number = {1}, pages = {1--15}, year = {2020}, url = {https://doi.org/10.4018/IJeC.2020010101}, doi = {10.4018/IJEC.2020010101}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijec/FatimaA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiuLCC20, author = {Lihua Liu and Yang Li and Zhengjun Cao and Zhen Chen}, title = {A Note On One Secure Data Self-Destructing Scheme In Cloud Computing}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {1}, pages = {36--40}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p36-40.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiuLCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MinaamIB20, author = {Diaa Salama Abdul Minaam and Mostafa Abdullah Ibrahim and Elsayed M. Badr}, title = {Chaotic {NHCP:} Building an Efficient Secure Framework for Cloud Computing Environment Based on Chaos Theory}, journal = {Int. J. Netw. Secur.}, volume = {22}, number = {2}, pages = {283--295}, year = {2020}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n2/ijns-2020-v22-n2-p283-295.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MinaamIB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/MohantaJS20, author = {Bhabendu Kumar Mohanta and Debasish Jena and Srichandan Sobhanayak}, title = {Multi-party computation review for secure data processing in IoT-fog computing environment}, journal = {Int. J. Secur. Networks}, volume = {15}, number = {3}, pages = {164--174}, year = {2020}, url = {https://doi.org/10.1504/IJSN.2020.109697}, doi = {10.1504/IJSN.2020.109697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/MohantaJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwmc/Das20, author = {Debasis Das}, title = {A hybrid algorithm for secure cloud computing}, journal = {Int. J. Wirel. Mob. Comput.}, volume = {18}, number = {2}, pages = {116--122}, year = {2020}, url = {https://doi.org/10.1504/IJWMC.2020.105693}, doi = {10.1504/IJWMC.2020.105693}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwmc/Das20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/AsheralievaN20a, author = {Alia Asheralieva and Dusit Niyato}, title = {Reputation-Based Coalition Formation for Secure Self-Organized and Scalable Sharding in IoT Blockchains With Mobile-Edge Computing}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {12}, pages = {11830--11850}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.3002969}, doi = {10.1109/JIOT.2020.3002969}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/AsheralievaN20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KumarSRTGKR20, author = {Gulshan Kumar and Rahul Saha and Mritunjay Kumar Rai and Reji Thomas and G. Geetha and Tai{-}Hoon Kim and Joel J. P. C. Rodrigues}, title = {A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {8}, pages = {7783--7794}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2991105}, doi = {10.1109/JIOT.2020.2991105}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KumarSRTGKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiLXXHL20, author = {Yiran Li and Hongwei Li and Guowen Xu and Tao Xiang and Xiaoming Huang and Rongxing Lu}, title = {Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {12}, pages = {11460--11472}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.3012480}, doi = {10.1109/JIOT.2020.3012480}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiLXXHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/PengCOVH20, author = {Cong Peng and Jianhua Chen and Mohammad S. Obaidat and Pandi Vijayakumar and Debiao He}, title = {Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {7}, pages = {6056--6068}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2949708}, doi = {10.1109/JIOT.2019.2949708}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/PengCOVH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RajeshPMJV20, author = {Sreeja Rajesh and Varghese Paul and Varun G. Menon and Sunil Jacob and P. Vinod}, title = {Secure Brain-to-Brain Communication With Edge Computing for Assisting Post-Stroke Paralyzed Patients}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {2531--2538}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2951405}, doi = {10.1109/JIOT.2019.2951405}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/RajeshPMJV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WuA20, author = {Di Wu and Nirwan Ansari}, title = {A Cooperative Computing Strategy for Blockchain-Secured Fog Computing}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {7}, pages = {6603--6609}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2974231}, doi = {10.1109/JIOT.2020.2974231}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WuA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotm/HammoudSMOMB20, author = {Ahmad Hammoud and Hani Sami and Azzam Mourad and Hadi Otrok and Rabeb Mizouni and Jamal Bentahar}, title = {AI, Blockchain, and Vehicular Edge Computing for Smart and Secure IoV: Challenges and Directions}, journal = {{IEEE} Internet Things Mag.}, volume = {3}, number = {2}, pages = {68--73}, year = {2020}, url = {https://doi.org/10.1109/IOTM.0001.1900109}, doi = {10.1109/IOTM.0001.1900109}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotm/HammoudSMOMB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MishraDYRVK20, author = {Dheerendra Mishra and Dharminder Dharminder and Preeti Yadav and Y. Sreenivasa Rao and Pandi Vijayakumar and Neeraj Kumar}, title = {A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party}, journal = {J. Inf. Secur. Appl.}, volume = {55}, pages = {102648}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102648}, doi = {10.1016/J.JISA.2020.102648}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MishraDYRVK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/LuPX20, author = {Xiuqing Lu and Zhenkuan Pan and Hequn Xian}, title = {An efficient and secure data sharing scheme for mobile devices in cloud computing}, journal = {J. Cloud Comput.}, volume = {9}, pages = {60}, year = {2020}, url = {https://doi.org/10.1186/s13677-020-00207-5}, doi = {10.1186/S13677-020-00207-5}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcloudc/LuPX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joeuc/NareshVDR20, author = {Ramu Naresh and Pandi Vijayakumar and Lazarus Jegatha Deborah and Sivakumar Radhakrishnan}, title = {A Novel Trust Model for Secure Group Communication in Distributed Computing}, journal = {J. Organ. End User Comput.}, volume = {32}, number = {3}, pages = {1--14}, year = {2020}, url = {https://doi.org/10.4018/JOEUC.2020070101}, doi = {10.4018/JOEUC.2020070101}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joeuc/NareshVDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/FanLZLY20, author = {Kai Fan and Tingting Liu and Kuan Zhang and Hui Li and Yintang Yang}, title = {A secure and efficient outsourced computation on data sharing scheme for privacy computing}, journal = {J. Parallel Distributed Comput.}, volume = {135}, pages = {169--176}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2019.09.008}, doi = {10.1016/J.JPDC.2019.09.008}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/FanLZLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/Jararweh20, author = {Yaser Jararweh}, title = {Enabling efficient and secure energy cloud using edge computing and 5G}, journal = {J. Parallel Distributed Comput.}, volume = {145}, pages = {42--49}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2020.06.014}, doi = {10.1016/J.JPDC.2020.06.014}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/Jararweh20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/YinQZDLL20, author = {Hui Yin and Zheng Qin and Jixin Zhang and Hua Deng and Fangmin Li and Keqin Li}, title = {A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing}, journal = {J. Parallel Distributed Comput.}, volume = {135}, pages = {56--69}, year = {2020}, url = {https://doi.org/10.1016/j.jpdc.2019.09.011}, doi = {10.1016/J.JPDC.2019.09.011}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/YinQZDLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrtip/LiuSWW20, author = {Dengzhi Liu and Jian Shen and Anxi Wang and Chen Wang}, title = {Secure real-time image protection scheme with near-duplicate detection in cloud computing}, journal = {J. Real Time Image Process.}, volume = {17}, number = {1}, pages = {175--184}, year = {2020}, url = {https://doi.org/10.1007/s11554-019-00887-6}, doi = {10.1007/S11554-019-00887-6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jrtip/LiuSWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/AbseherBCDW20, author = {Michael Abseher and Bernhard Bliem and G{\"{u}}nther Charwat and Frederico Dusberger and Stefan Woltran}, title = {Computing secure sets in graphs using answer set programming}, journal = {J. Log. Comput.}, volume = {30}, number = {4}, pages = {837--862}, year = {2020}, url = {https://doi.org/10.1093/logcom/exv060}, doi = {10.1093/LOGCOM/EXV060}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/AbseherBCDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/KhanUNNQKKA20, author = {Muhammad Asghar Khan and Insaf Ullah and Shibli Nisar and Fazal Noor and Ijaz Mansoor Qureshi and Fahim Ullah Khanzada and Hizbullah Khattak and Muhammad Adnan Aziz}, title = {Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption}, journal = {Mob. Inf. Syst.}, volume = {2020}, pages = {8861947:1--8861947:15}, year = {2020}, url = {https://doi.org/10.1155/2020/8861947}, doi = {10.1155/2020/8861947}, timestamp = {Mon, 12 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/KhanUNNQKKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SC20, author = {Uma Maheswari S and Vasanthanayaki C}, title = {Secure medical health care content protection system {(SMCPS)} with watermark detection for multi cloud computing environment}, journal = {Multim. Tools Appl.}, volume = {79}, number = {5-6}, pages = {4075--4097}, year = {2020}, url = {https://doi.org/10.1007/s11042-019-7724-z}, doi = {10.1007/S11042-019-7724-Z}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/YangLGZDL20, author = {Yang Yang and Ximeng Liu and Wenzhong Guo and Xianghan Zheng and Chen Dong and Zhiquan Liu}, title = {Multimedia access control with secure provenance in fog-cloud computing networks}, journal = {Multim. Tools Appl.}, volume = {79}, number = {15-16}, pages = {10701--10716}, year = {2020}, url = {https://doi.org/10.1007/s11042-020-08703-1}, doi = {10.1007/S11042-020-08703-1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/YangLGZDL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/QiuQL20, author = {Han Qiu and Meikang Qiu and Ruqian Lu}, title = {Secure {V2X} Communication Network based on Intelligent {PKI} and Edge Computing}, journal = {{IEEE} Netw.}, volume = {34}, number = {2}, pages = {172--178}, year = {2020}, url = {https://doi.org/10.1109/MNET.001.1900243}, doi = {10.1109/MNET.001.1900243}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/QiuQL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pcs/ShokurovAVZ20, author = {Alexander V. Shokurov and I. V. Abramova and Nikolay P. Varnovsky and Vladimir A. Zakharov}, title = {On the Possibility of Secure Program Obfuscation in Some Model of Cloud Computing}, journal = {Program. Comput. Softw.}, volume = {46}, number = {7}, pages = {473--482}, year = {2020}, url = {https://doi.org/10.1134/S0361768820070051}, doi = {10.1134/S0361768820070051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pcs/ShokurovAVZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AwanSHSAD20, author = {Ijaz Ahmad Awan and Muhammad Shiraz and Muhammad Usman Hashmi and Qaisar Shaheen and Rizwan Akhtar and Allah Ditta}, title = {Secure Framework Enhancing {AES} Algorithm in Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8863345:1--8863345:16}, year = {2020}, url = {https://doi.org/10.1155/2020/8863345}, doi = {10.1155/2020/8863345}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AwanSHSAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZouZSWPPW20, author = {Ying Zou and Zhen Zhao and Sha Shi and Lei Wang and Yunfeng Peng and Yuan Ping and Baocang Wang}, title = {Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {1238505:1--1238505:11}, year = {2020}, url = {https://doi.org/10.1155/2020/1238505}, doi = {10.1155/2020/1238505}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZouZSWPPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/AlmajedA20, author = {Hisham N. Almajed and Ahmad S. Al{-}Mogren}, title = {A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things}, journal = {Sensors}, volume = {20}, number = {21}, pages = {6158}, year = {2020}, url = {https://doi.org/10.3390/s20216158}, doi = {10.3390/S20216158}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/AlmajedA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiLFWLG20, author = {Haifeng Li and Caihui Lan and Xingbing Fu and Caifen Wang and Fagen Li and He Guo}, title = {A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile Cloud Computing}, journal = {Sensors}, volume = {20}, number = {17}, pages = {4720}, year = {2020}, url = {https://doi.org/10.3390/s20174720}, doi = {10.3390/S20174720}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/LiLFWLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NawazQGAGBKW20, author = {Anum Nawaz and Jorge Pe{\~{n}}a Queralta and Jixin Guan and Muhammad Awais and Tuan Nguyen Gia and Ali Kashif Bashir and Haibin Kan and Tomi Westerlund}, title = {Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain}, journal = {Sensors}, volume = {20}, number = {14}, pages = {3965}, year = {2020}, url = {https://doi.org/10.3390/s20143965}, doi = {10.3390/S20143965}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/NawazQGAGBKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NkenyereyeTSC20, author = {Lewis Nkenyereye and Bayu Adhi Tama and Muhammad Khuram Shahzad and Yoon{-}Ho Choi}, title = {Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing}, journal = {Sensors}, volume = {20}, number = {1}, pages = {154}, year = {2020}, url = {https://doi.org/10.3390/s20010154}, doi = {10.3390/S20010154}, timestamp = {Fri, 15 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/NkenyereyeTSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WuCZCC20, author = {Hsiao{-}Ling Wu and Chin{-}Chen Chang and Yao{-}Zhu Zheng and Long{-}Sheng Chen and Chih{-}Cheng Chen}, title = {A Secure IoT-Based Authentication System in Cloud Computing Environment}, journal = {Sensors}, volume = {20}, number = {19}, pages = {5604}, year = {2020}, url = {https://doi.org/10.3390/s20195604}, doi = {10.3390/S20195604}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WuCZCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/JiaHKC20, author = {Xiaoying Jia and Debiao He and Neeraj Kumar and Kim{-}Kwang Raymond Choo}, title = {A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing}, journal = {{IEEE} Syst. J.}, volume = {14}, number = {1}, pages = {560--571}, year = {2020}, url = {https://doi.org/10.1109/JSYST.2019.2896064}, doi = {10.1109/JSYST.2019.2896064}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/JiaHKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/YanWGLH20, author = {Jiajun Yan and Xiaoming Wang and Qingqing Gan and Suyu Li and Daxin Huang}, title = {Secure and efficient big data deduplication in fog computing}, journal = {Soft Comput.}, volume = {24}, number = {8}, pages = {5671--5682}, year = {2020}, url = {https://doi.org/10.1007/s00500-019-04215-9}, doi = {10.1007/S00500-019-04215-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/YanWGLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/suscom/ZhengLLS20, author = {Wenying Zheng and Dengzhi Liu and Xiong Li and Arun Kumar Sangaiah}, title = {Secure sustainable storage auditing protocol {(SSSAP)} with efficient key updates for cloud computing}, journal = {Sustain. Comput. Informatics Syst.}, volume = {28}, pages = {100237}, year = {2020}, url = {https://doi.org/10.1016/j.suscom.2018.03.002}, doi = {10.1016/J.SUSCOM.2018.03.002}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/suscom/ZhengLLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/YuHC20, author = {Yicheng Yu and Liang Hu and Jianfeng Chu}, title = {A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment}, journal = {Symmetry}, volume = {12}, number = {1}, pages = {150}, year = {2020}, url = {https://doi.org/10.3390/sym12010150}, doi = {10.3390/SYM12010150}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/YuHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/ZaghloulZR20, author = {Ehab Zaghloul and Kai Zhou and Jian Ren}, title = {{P-MOD:} Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing}, journal = {{IEEE} Trans. Big Data}, volume = {6}, number = {4}, pages = {804--815}, year = {2020}, url = {https://doi.org/10.1109/TBDATA.2019.2907133}, doi = {10.1109/TBDATA.2019.2907133}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tbd/ZaghloulZR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Cai0T0Y20, author = {Yi Cai and Xiaoming Chen and Lu Tian and Yu Wang and Huazhong Yang}, title = {Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption}, journal = {{IEEE} Trans. Computers}, volume = {69}, number = {11}, pages = {1596--1610}, year = {2020}, url = {https://doi.org/10.1109/TC.2020.3017870}, doi = {10.1109/TC.2020.3017870}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Cai0T0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/Lee20, author = {Kwangsu Lee}, title = {Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption"}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {8}, number = {4}, pages = {1299--1300}, year = {2020}, url = {https://doi.org/10.1109/TCC.2020.2973623}, doi = {10.1109/TCC.2020.2973623}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/Lee20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/RenZFQL20, author = {Yanli Ren and Xinpeng Zhang and Guorui Feng and Zhenxing Qian and Fengyong Li}, title = {How to Extract Image Features Based on Co-Occurrence Matrix Securely and Efficiently in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {8}, number = {1}, pages = {207--219}, year = {2020}, url = {https://doi.org/10.1109/TCC.2017.2737980}, doi = {10.1109/TCC.2017.2737980}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/RenZFQL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/BitarPR20, author = {Rawad Bitar and Parimal Parag and Salim El Rouayheb}, title = {Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes}, journal = {{IEEE} Trans. Commun.}, volume = {68}, number = {8}, pages = {4609--4619}, year = {2020}, url = {https://doi.org/10.1109/TCOMM.2020.2988506}, doi = {10.1109/TCOMM.2020.2988506}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/BitarPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/WuZHW20, author = {Wei Wu and Fuhui Zhou and Rose Qingyang Hu and Baoyun Wang}, title = {Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks}, journal = {{IEEE} Trans. Commun.}, volume = {68}, number = {1}, pages = {493--505}, year = {2020}, url = {https://doi.org/10.1109/TCOMM.2019.2949994}, doi = {10.1109/TCOMM.2019.2949994}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/WuZHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/ZhouPYWEVL20, author = {Yi Zhou and Cunhua Pan and Phee Lep Yeoh and Kezhi Wang and Maged Elkashlan and Branka Vucetic and Yonghui Li}, title = {Secure Communications for UAV-Enabled Mobile Edge Computing Systems}, journal = {{IEEE} Trans. Commun.}, volume = {68}, number = {1}, pages = {376--388}, year = {2020}, url = {https://doi.org/10.1109/TCOMM.2019.2947921}, doi = {10.1109/TCOMM.2019.2947921}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/ZhouPYWEVL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/FuYLYWY20, author = {Cai Fu and Zhao Yang and Xiao{-}Yang Liu and Jia Yang and Anwar Walid and Laurence T. Yang}, title = {Secure Tensor Decomposition for Heterogeneous Multimedia Data in Cloud Computing}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {7}, number = {1}, pages = {247--260}, year = {2020}, url = {https://doi.org/10.1109/TCSS.2019.2959948}, doi = {10.1109/TCSS.2019.2959948}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/FuYLYWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/NiZYLS20, author = {Jianbing Ni and Kuan Zhang and Yong Yu and Xiaodong Lin and Xuemin Sherman Shen}, title = {Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {581--594}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2791432}, doi = {10.1109/TDSC.2018.2791432}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/NiZYLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/ShenLBSSC20, author = {Jian Shen and Dengzhi Liu and Md. Zakirul Alam Bhuiyan and Jun Shen and Xingming Sun and Aniello Castiglione}, title = {Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {8}, number = {2}, pages = {280--290}, year = {2020}, url = {https://doi.org/10.1109/TETC.2017.2776402}, doi = {10.1109/TETC.2017.2776402}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/ShenLBSSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/JangiralaDV20, author = {Srinivas Jangirala and Ashok Kumar Das and Athanasios V. Vasilakos}, title = {Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {16}, number = {11}, pages = {7081--7093}, year = {2020}, url = {https://doi.org/10.1109/TII.2019.2942389}, doi = {10.1109/TII.2019.2942389}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/JangiralaDV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/ElgendyZZHTY20, author = {Ibrahim A. Elgendy and Weizhe Zhang and Yiming Zeng and Hui He and Yu{-}Chu Tian and Yuanyuan Yang}, title = {Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {17}, number = {4}, pages = {2410--2422}, year = {2020}, url = {https://doi.org/10.1109/TNSM.2020.3020249}, doi = {10.1109/TNSM.2020.3020249}, timestamp = {Wed, 26 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/ElgendyZZHTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/GuWYJ20, author = {Ke Gu and Na Wu and Bo Yin and Weijia Jia}, title = {Secure Data Query Framework for Cloud and Fog Computing}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {17}, number = {1}, pages = {332--345}, year = {2020}, url = {https://doi.org/10.1109/TNSM.2019.2941869}, doi = {10.1109/TNSM.2019.2941869}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/GuWYJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/ZhouWDO20, author = {Zhenyu Zhou and Bingchen Wang and Mianxiong Dong and Kaoru Ota}, title = {Secure and Efficient Vehicle-to-Grid Energy Trading in Cyber Physical Systems: Integration of Blockchain and Edge Computing}, journal = {{IEEE} Trans. Syst. Man Cybern. Syst.}, volume = {50}, number = {1}, pages = {43--57}, year = {2020}, url = {https://doi.org/10.1109/TSMC.2019.2896323}, doi = {10.1109/TSMC.2019.2896323}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/ZhouWDO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/ElhosenyAHMS20, author = {Mohamed Elhoseny and Hosny A. Abbas and Aboul Ella Hassanien and Khan Muhammad and Arun Kumar Sangaiah}, title = {Secure Automated Forensic Investigation for Sustainable Critical Infrastructures Compliant with Green Computing Requirements}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {5}, number = {2}, pages = {174--191}, year = {2020}, url = {https://doi.org/10.1109/TSUSC.2017.2782737}, doi = {10.1109/TSUSC.2017.2782737}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/ElhosenyAHMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WangYCWLW20, author = {Jun{-}Bo Wang and Hui Yang and Ming Cheng and Jin{-}Yuan Wang and Min Lin and Jiangzhou Wang}, title = {Joint Optimization of Offloading and Resources Allocation in Secure Mobile Edge Computing Systems}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {8}, pages = {8843--8854}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.2996254}, doi = {10.1109/TVT.2020.2996254}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WangYCWLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/HeJD20, author = {Xiaofan He and Richeng Jin and Huaiyu Dai}, title = {Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {19}, number = {6}, pages = {4054--4066}, year = {2020}, url = {https://doi.org/10.1109/TWC.2020.2979456}, doi = {10.1109/TWC.2020.2979456}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/HeJD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/KumarAMKK20, author = {Vinod Kumar and Musheer Ahmad and Dheerendra Mishra and Saru Kumari and Muhammad Khurram Khan}, title = {{RSEAP:} {RFID} based secure and efficient authentication protocol for vehicular cloud computing}, journal = {Veh. Commun.}, volume = {22}, pages = {100213}, year = {2020}, url = {https://doi.org/10.1016/j.vehcom.2019.100213}, doi = {10.1016/J.VEHCOM.2019.100213}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/KumarAMKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/ZhouYPWEWVL20, author = {Yi Zhou and Phee Lep Yeoh and Cunhua Pan and Kezhi Wang and Maged Elkashlan and Zhongfeng Wang and Branka Vucetic and Yonghui Li}, title = {Offloading Optimization for Low-Latency Secure Mobile Edge Computing Systems}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {9}, number = {4}, pages = {480--484}, year = {2020}, url = {https://doi.org/10.1109/LWC.2019.2959579}, doi = {10.1109/LWC.2019.2959579}, timestamp = {Mon, 24 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wcl/ZhouYPWEWVL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/WangLYYX20, author = {Zhe Wang and Taoshen Li and Jin Ye and Xi Yang and Ke Xiong}, title = {AN-Aided Secure Beamforming in SWIPT-Aware Mobile Edge Computing Systems with Cognitive Radio}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {8899314:1--8899314:10}, year = {2020}, url = {https://doi.org/10.1155/2020/8899314}, doi = {10.1155/2020/8899314}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/WangLYYX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/FangZCLT20, author = {Weidong Fang and Wuxiong Zhang and Wei Chen and Yang Liu and Chaogang Tang}, title = {{TMSRS:} trust management-based secure routing scheme in industrial wireless sensor network with fog computing}, journal = {Wirel. Networks}, volume = {26}, number = {5}, pages = {3169--3182}, year = {2020}, url = {https://doi.org/10.1007/s11276-019-02129-w}, doi = {10.1007/S11276-019-02129-W}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/FangZCLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/KhedrHKA20, author = {Walid I. Khedr and Khalid M. Hosny and Marwa M. Khashaba and Fathy A. Amer}, title = {Prediction-based secured handover authentication for mobile cloud computing}, journal = {Wirel. Networks}, volume = {26}, number = {6}, pages = {4657--4675}, year = {2020}, url = {https://doi.org/10.1007/s11276-020-02368-2}, doi = {10.1007/S11276-020-02368-2}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/KhedrHKA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/SuTWL20, author = {Yunxuan Su and Zheng Tu and Xu An Wang and Ruifeng Li}, editor = {Leonard Barolli and Makoto Takizawa and Tomoki Yoshihisa and Flora Amato and Makoto Ikeda}, title = {Secure Outsourcing Protocol Based on Paillier Algorithm for Cloud Computing}, booktitle = {Advances on P2P, Parallel, Grid, Cloud and Internet Computing - Proceedings of the 15th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2020), Yonago City, Tottori Prefecture, Japan, October 28-30, 2020}, series = {Lecture Notes in Networks and Systems}, volume = {158}, pages = {376--384}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61105-7\_38}, doi = {10.1007/978-3-030-61105-7\_38}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/SuTWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ZhaoWLLZ20, author = {Kaiyang Zhao and Xu An Wang and Yao Liu and Jiasen Liu and Songyin Zhao}, editor = {Leonard Barolli and Flora Amato and Francesco Moscato and Tomoya Enokido and Makoto Takizawa}, title = {Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud Computing}, booktitle = {Web, Artificial Intelligence and Network Applications - Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications, {AINA} Workshops 2020, Caserta, Italy, 15-17 April}, series = {Advances in Intelligent Systems and Computing}, volume = {1150}, pages = {138--148}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44038-1\_13}, doi = {10.1007/978-3-030-44038-1\_13}, timestamp = {Thu, 04 Apr 2024 17:08:34 +0200}, biburl = {https://dblp.org/rec/conf/aina/ZhaoWLLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atci/YangF20, author = {Mei Yang and Fancheng Fu}, editor = {Jemal H. Abawajy and Kim{-}Kwang Raymond Choo and Zheng Xu and Mohammed Atiquzzaman}, title = {Secure Big Data Computing Based on Trusted Computing and Key Management}, booktitle = {2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI} 2020), Fuyang, China, 20-22 June, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1244}, pages = {1114--1118}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-53980-1\_169}, doi = {10.1007/978-3-030-53980-1\_169}, timestamp = {Tue, 05 Apr 2022 12:05:39 +0200}, biburl = {https://dblp.org/rec/conf/atci/YangF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbd/YuLZW20, author = {Feng Yu and Xixian Li and Huimin Zhang and Li{-}e Wang}, title = {Secure Data Propagation in Edge-Cloud Orchestrated Computing Paradigms: Statistcs and Taxonomy}, booktitle = {Eighth International Conference on Advanced Cloud and Big Data, {CBD} 2020, Taiyuan, China, December 5-6, 2020}, pages = {253--258}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CBD51900.2020.00053}, doi = {10.1109/CBD51900.2020.00053}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cbd/YuLZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cncert/ZhangSH20, author = {Jiuling Zhang and Shijun Shen and Daochao Huang}, editor = {Wei Lu and Qiaoyan Wen and Yuqing Zhang and Bo Lang and Weiping Wen and Hanbing Yan and Chao Li and Li Ding and Ruiguang Li and Yu Zhou}, title = {A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing}, booktitle = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing, China, August 12, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1299}, pages = {29--36}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-33-4922-3\_3}, doi = {10.1007/978-981-33-4922-3\_3}, timestamp = {Thu, 15 Dec 2022 13:17:06 +0100}, biburl = {https://dblp.org/rec/conf/cncert/ZhangSH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LeiTLX20, author = {Xinyu Lei and Guan{-}Hua Tu and Alex X. Liu and Tian Xie}, title = {Fast and Secure kNN Query Processing in Cloud Computing}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162307}, doi = {10.1109/CNS48642.2020.9162307}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/LeiTLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ChengDLWG20, author = {Cong Cheng and Huan Dai and Lingzhi Li and Jin Wang and Fei Gu}, editor = {Honghao Gao and Xinheng Wang and Muddesar Iqbal and Yuyu Yin and Jianwei Yin and Ning Gu}, title = {The Design and Implementation of Secure Distributed Image Classification Model Training System for Heterogenous Edge Computing}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 16th {EAI} International Conference, CollaborateCom 2020, Shanghai, China, October 16-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {349}, pages = {179--198}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-67537-0\_12}, doi = {10.1007/978-3-030-67537-0\_12}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ChengDLWG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cyberc/WangZL20, author = {Jingzhong Wang and Yue Zhang and Haibin Li}, title = {Electronic voting protocol based on ring signature and secure multi-party computing}, booktitle = {International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2020, Chongqing, China, October 29-30, 2020}, pages = {50--55}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CyberC49757.2020.00018}, doi = {10.1109/CYBERC49757.2020.00018}, timestamp = {Tue, 02 Feb 2021 11:46:01 +0100}, biburl = {https://dblp.org/rec/conf/cyberc/WangZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/0001PCUMCCBJANM20, author = {Behzad Salami and Konstantinos Parasyris and Adri{\'{a}}n Cristal and Osman S. Unsal and Xavier Martorell and Paul Carpenter and Ra{\'{u}}l de la Cruz and Leonardo Bautista{-}Gomez and Daniel A. Jim{\'{e}}nez and Carlos {\'{A}}lvarez and Seyed Saber Nabavi Larimi and Sergi Madonar and Miquel Peric{\`{a}}s and Pedro Trancoso and Mustafa Abduljabbar and Jing Chen and Pirah Noor Soomro and Madhavan Manivannan and Micha vor dem Berge and Stefan Krupop and Frank Klawonn and Al Mekhlafi and Sigrun May and Tobias Becker and Georgi Gaydadjiev and Hans Salomonsson and Devdatt P. Dubhashi and Oron Port and Yoav Etsion and Do Le Quoc and Christof Fetzer and Martin Kaiser and Nils Kucza and Jens Hagemeyer and Ren{\'{e}} Griessl and Lennart Tigges and Kevin Mika and A. H{\"{u}}ffmeier and Marcelo Pasin and Valerio Schiavoni and Isabelly Rocha and Christian G{\"{o}}ttel and Pascal Felber}, title = {LEGaTO: Low-Energy, Secure, and Resilient Toolset for Heterogeneous Computing}, booktitle = {2020 Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020}, pages = {169--174}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/DATE48585.2020.9116362}, doi = {10.23919/DATE48585.2020.9116362}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/0001PCUMCCBJANM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AgrawalGKP20, author = {Shweta Agrawal and Rachit Garg and Nishant Kumar and Manoj Prabhakaran}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {42--63}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_3}, doi = {10.1007/978-3-030-58951-6\_3}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AgrawalGKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/IonKNPSS0SY20, author = {Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Shobhit Saxena and Karn Seth and Mariana Raykova and David Shanahan and Moti Yung}, title = {On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2020, Genoa, Italy, September 7-11, 2020}, pages = {370--389}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EuroSP48549.2020.00031}, doi = {10.1109/EUROSP48549.2020.00031}, timestamp = {Tue, 10 Nov 2020 11:45:04 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/IonKNPSS0SY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HewaBYL20, author = {Tharaka Mawanane Hewa and An Braeken and Mika Ylianttila and Madhusanka Liyanage}, title = {Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoT}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual Event, Taiwan, December 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GLOBECOM42002.2020.9348125}, doi = {10.1109/GLOBECOM42002.2020.9348125}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HewaBYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RoshanM0MT20, author = {Rishu Roshan and Rakesh Matam and Mithun Mukherjee and Jaime Lloret Mauri and Somanath Tripathy}, title = {A secure task-offloading framework for cooperative fog computing environment}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual Event, Taiwan, December 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GLOBECOM42002.2020.9322509}, doi = {10.1109/GLOBECOM42002.2020.9322509}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/RoshanM0MT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/YelluBXY20, author = {Pruthvy Yellu and Landon Buell and Dongpeng Xu and Qiaoyan Yu}, editor = {Tinoosh Mohsenin and Weisheng Zhao and Yiran Chen and Onur Mutlu}, title = {Blurring Boundaries: {A} New Way to Secure Approximate Computing Systems}, booktitle = {{GLSVLSI} '20: Great Lakes Symposium on {VLSI} 2020, Virtual Event, China, September 7-9, 2020}, pages = {327--332}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3386263.3407593}, doi = {10.1145/3386263.3407593}, timestamp = {Mon, 04 Jul 2022 14:19:34 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/YelluBXY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icact/TsaiCCMH20, author = {Wang{-}You Tsai and Tzu{-}Chuan Chou and Jiann{-}Liang Chen and Yi{-}Wei Ma and Chen{-}Jui Huang}, title = {Blockchain as a Platform for Secure Cloud Computing Services}, booktitle = {22nd International Conference on Advanced Communication Technology, {ICACT} 2020, Phoenix Park, PyeongChang, Korea (South), February 16-19, 2020}, pages = {155--158}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICACT48636.2020.9061435}, doi = {10.23919/ICACT48636.2020.9061435}, timestamp = {Mon, 21 Mar 2022 08:04:55 +0100}, biburl = {https://dblp.org/rec/conf/icact/TsaiCCMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbta/HouLLWZX20, author = {Yujiao Hou and Mengxiao Luo and Yutong Liu and Ning Wang and Jinjin Zhang and Weisheng Xu}, title = {Secure and Privacy-Preserving Data Computing Scheme Based on Blockchain for Double-Loop Governance of Smart Society}, booktitle = {{ICBTA} 2020: The 3rd International Conference on Blockchain Technology and Applications, Xi'an, China, December, 2020}, pages = {75--80}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3446983.3446995}, doi = {10.1145/3446983.3446995}, timestamp = {Tue, 08 Mar 2022 14:42:53 +0100}, biburl = {https://dblp.org/rec/conf/icbta/HouLLWZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChenCWLX20, author = {Zunming Chen and Hongyan Cui and Ensen Wu and Yuanxin Li and Yu Xi}, title = {Secure Distributed Data Management for Fog Computing in Large-Scale IoT Application: {A} Blockchain-Based Solution}, booktitle = {2020 {IEEE} International Conference on Communications Workshops, {ICC} Workshops 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCWorkshops49005.2020.9145381}, doi = {10.1109/ICCWORKSHOPS49005.2020.9145381}, timestamp = {Fri, 31 Jul 2020 09:47:51 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChenCWLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChenSC20, author = {Jiajun Chen and Chi Wan Sung and Terence H. Chan}, title = {Storage and Computation: {A} Tradeoff in Secure Distributed Computing}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149183}, doi = {10.1109/ICC40277.2020.9149183}, timestamp = {Mon, 22 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChenSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YinYTWRAA20, author = {Mingxi Yin and Jinliang Yu and Shanshan Tu and Muhammad Waqas and Sadaqat ur Rehman and Ghulam Abbas and Ziaul Haq Abbas}, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network}, booktitle = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12239}, pages = {173--183}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57884-8\_16}, doi = {10.1007/978-3-030-57884-8\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/YinYTWRAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icea/KimP20, author = {Seong{-}Jin Kim and Ki{-}Woong Park}, title = {Blueprint for a Secure Container to Protect Data in Edge Cloud Computing Environment}, booktitle = {{ACM} {ICEA} '20: 2020 {ACM} International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12 - 15, 2020}, pages = {33:1--33:3}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3440943.3444355}, doi = {10.1145/3440943.3444355}, timestamp = {Wed, 29 Sep 2021 09:35:11 +0200}, biburl = {https://dblp.org/rec/conf/icea/KimP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icpads/GuanGL020, author = {Yue Guan and Songtao Guo and Pan Li and Yuanyuan Yang}, title = {Secure and Verifiable Data Access Control Scheme With Policy Update and Computation Outsourcing for Edge Computing}, booktitle = {26th {IEEE} International Conference on Parallel and Distributed Systems, {ICPADS} 2020, Hong Kong, December 2-4, 2020}, pages = {398--405}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICPADS51040.2020.00060}, doi = {10.1109/ICPADS51040.2020.00060}, timestamp = {Wed, 03 Mar 2021 11:21:59 +0100}, biburl = {https://dblp.org/rec/conf/icpads/GuanGL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icteri/GnatyukIKOBG20, author = {Sergiy Gnatyuk and Maksim Iavich and Vasyl Kinzeryavyy and Tetyana Okhrimenko and Yuliia Burmak and Iuliia Goncharenko}, editor = {Oleksandr Sokolov and Grygoriy Zholtkevych and Vitaliy Yakovyna and Yulia Tarasich and Vyacheslav Kharchenko and Vitaliy Kobets and Olexandr Burov and Serhiy Semerikov and Hennadiy Kravtsov}, title = {Improved Secure Stream Cipher for Cloud Computing}, booktitle = {Proceedings of the 16th International Conference on {ICT} in Education, Research and Industrial Applications. Integration, Harmonization and Knowledge Transfer. Volume {II:} Workshops, Kharkiv, Ukraine, October 06-10, 2020}, series = {{CEUR} Workshop Proceedings}, volume = {2732}, pages = {183--197}, publisher = {CEUR-WS.org}, year = {2020}, url = {https://ceur-ws.org/Vol-2732/20200183.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:14 +0100}, biburl = {https://dblp.org/rec/conf/icteri/GnatyukIKOBG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/BosriUOBR20, author = {Rabeya Bosri and Abdur Razzak Uzzal and Abdullah Al Omar and Md. Zakirul Alam Bhuiyan and Mohammad Shahriar Rahman}, title = {HIDEchain: {A} User-Centric Secure Edge Computing Architecture for Healthcare IoT Devices}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {376--381}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162729}, doi = {10.1109/INFOCOMWKSHPS50562.2020.9162729}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/BosriUOBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iniscom/HaTH20, author = {Dac{-}Binh Ha and Van{-}Truong Truong and Duy{-}Hung Ha}, editor = {Nguyen{-}Son Vo and Van{-}Phuc Hoang}, title = {A Novel Secure Protocol for Mobile Edge Computing Network Applied Downlink {NOMA}}, booktitle = {Industrial Networks and Intelligent Systems - 6th {EAI} International Conference, {INISCOM} 2020, Hanoi, Vietnam, August 27-28, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {334}, pages = {324--336}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63083-6\_25}, doi = {10.1007/978-3-030-63083-6\_25}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iniscom/HaTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/ChanCLS20, author = {T.{-}H. Hubert Chan and Kai{-}Min Chung and Wei{-}Kai Lin and Elaine Shi}, editor = {Thomas Vidick}, title = {{MPC} for {MPC:} Secure Computation on a Massively Parallel Computing Architecture}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {75:1--75:52}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.75}, doi = {10.4230/LIPICS.ITCS.2020.75}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/ChanCLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/YelluY20, author = {Pruthvy Yellu and Qiaoyan Yu}, title = {Can We Securely Use Approximate Computing?}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2020, Sevilla, Spain, October 10-21, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISCAS45731.2020.9180840}, doi = {10.1109/ISCAS45731.2020.9180840}, timestamp = {Mon, 18 Jan 2021 08:38:59 +0100}, biburl = {https://dblp.org/rec/conf/iscas/YelluY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isocc/HoPLCG20, author = {Weng{-}Geng Ho and Ali Akbar Pammu and Ne Kyaw Zwa Lwin and Kwen{-}Siong Chong and Bah{-}Hwee Gwee}, title = {High Throughput and Secure Authentication-Encryption on Asynchronous Multicore Processor for Edge Computing IoT Applications}, booktitle = {International SoC Design Conference, {ISOCC} 2020, Yeosu, South Korea, October 21-24, 2020}, pages = {173--174}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISOCC50952.2020.9333008}, doi = {10.1109/ISOCC50952.2020.9333008}, timestamp = {Fri, 12 Feb 2021 11:57:12 +0100}, biburl = {https://dblp.org/rec/conf/isocc/HoPLCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/DongWGZLW20, author = {Tingting Dong and Jin Wang and Fei Gu and Jingya Zhou and Kejie Lu and Jianping Wang}, editor = {Jia Hu and Geyong Min and Nektarios Georgalas and Zhiwei Zhao and Fei Hao and Wang Miao}, title = {{MCSEC:} Secure Coded Matrix Multiplication Scheme for Edge Computing with Minimum Communication Cost}, booktitle = {{IEEE} International Conference on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom 2020, Exeter, United Kingdom, December 17-19, 2020}, pages = {192--199}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00050}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM51426.2020.00050}, timestamp = {Tue, 17 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/DongWGZLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iticse/BlairCRS20, author = {Jean R. S. Blair and Christa M. Chewar and Rajendra K. Raj and Edward Sobiesk}, editor = {Michail N. Giannakos and Guttorm Sindre and Andrew Luxton{-}Reilly and Monica Divitini}, title = {Infusing Principles and Practices for Secure Computing Throughout an Undergraduate Computer Science Curriculum}, booktitle = {Proceedings of the 2020 {ACM} Conference on Innovation and Technology in Computer Science Education, ITiCSE 2020, Trondheim, Norway, June 15-19, 2020}, pages = {82--88}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341525.3387426}, doi = {10.1145/3341525.3387426}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iticse/BlairCRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/XuLLZY20, author = {Jia Xu and Xiao Liu and Xuejun Li and Lei Zhang and Yun Yang}, title = {Express: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems**This research is in part supported by the National Natural Science Foundation of China Project No. 61972001}, booktitle = {35th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2020, Melbourne, Australia, September 21-25, 2020}, pages = {1283--1286}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1145/3324884.3415294}, doi = {10.1145/3324884.3415294}, timestamp = {Thu, 01 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/XuLLZY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/medes/AlamerBH20, author = {Abdulrahman Alamer and Sultan Basudan and Patrick C. K. Hung}, editor = {Richard Chbeir and Yannis Manolopoulos and Ernesto Damiani and Djamal Benslimane and Ladjel Bellatreche and Tadeusz Morzy}, title = {A Secure Tracing Method in Fog Computing Network for the IoT Devices}, booktitle = {{MEDES} '20: 12th International Conference on Management of Digital EcoSystems, Virtual Event, United Arab Emirates, 2-4 November, 2020}, pages = {104--110}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3415958.3433074}, doi = {10.1145/3415958.3433074}, timestamp = {Tue, 01 Dec 2020 15:24:04 +0100}, biburl = {https://dblp.org/rec/conf/medes/AlamerBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/micro/DangwalCALRT20, author = {Deeksha Dangwal and Meghan Cowan and Armin Alaghi and Vincent T. Lee and Brandon Reagen and Caroline Trippel}, editor = {Jakub Szefer and Weidong Shi and Ruby B. Lee}, title = {SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing}, booktitle = {HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020}, pages = {8:1--8:9}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3458903.3458911}, doi = {10.1145/3458903.3458911}, timestamp = {Tue, 26 Oct 2021 15:43:33 +0200}, biburl = {https://dblp.org/rec/conf/micro/DangwalCALRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/WuXLZ20, author = {Fan Wu and Zhuoqun Xu and Huanghe Liu and Zongwei Zhu}, editor = {Xiaofeng Chen and Hongyang Yan and Qiben Yan and Xiangliang Zhang}, title = {Machine Learning Agricultural Application Based on the Secure Edge Computing Platform}, booktitle = {Machine Learning for Cyber Security - Third International Conference, {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12486}, pages = {206--220}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62223-7\_18}, doi = {10.1007/978-3-030-62223-7\_18}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ml4cs/WuXLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/Ogiela0O20, author = {Lidia Ogiela and Makoto Takizawa and Urszula Ogiela}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Makoto Takizawa}, title = {Secure Cognitive Protocols for Data Fusion in Transformative Computing}, booktitle = {Advances in Networked-Based Information Systems - The 23rd International Conference on Network-Based Information Systems, NBiS 2020, Victoria, BC, Canada, 31 August - 2 September 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1264}, pages = {89--93}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57811-4\_9}, doi = {10.1007/978-3-030-57811-4\_9}, timestamp = {Fri, 21 Aug 2020 15:16:47 +0200}, biburl = {https://dblp.org/rec/conf/nbis/Ogiela0O20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsdi/HuntJMSHRW20, author = {Tyler Hunt and Zhipeng Jia and Vance Miller and Ariel Szekely and Yige Hu and Christopher J. Rossbach and Emmett Witchel}, editor = {Ranjita Bhagwan and George Porter}, title = {Telekine: Secure Computing with Cloud GPUs}, booktitle = {17th {USENIX} Symposium on Networked Systems Design and Implementation, {NSDI} 2020, Santa Clara, CA, USA, February 25-27, 2020}, pages = {817--833}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/nsdi20/presentation/hunt}, timestamp = {Tue, 02 Feb 2021 08:04:59 +0100}, biburl = {https://dblp.org/rec/conf/nsdi/HuntJMSHRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdp/KotenkoSS20, author = {Igor V. Kotenko and Yury Sineshchuk and Igor Saenko}, title = {Optimizing Secure Information Interaction in Distributed Computing Systems by the Sequential Concessions Method}, booktitle = {28th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, {PDP} 2020, V{\"{a}}ster{\aa}s, Sweden, March 11-13, 2020}, pages = {429--432}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/PDP50117.2020.00072}, doi = {10.1109/PDP50117.2020.00072}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdp/KotenkoSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sc/PierceM20, author = {Marlon E. Pierce and Suresh Marru}, title = {Integrating Science Gateways with Secure Cloud Computing Resources: An Examination of Two Deployment Patterns and Their Requirements}, booktitle = {{IEEE/ACM} International Workshop on {HPC} User Support Tools and Workshop on Programming and Performance Visualization Tools, HUST/ProTools@SC 2020, Atlanta, GA, USA, November 18, 2020}, pages = {19--26}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/HUSTProtools51951.2020.00010}, doi = {10.1109/HUSTPROTOOLS51951.2020.00010}, timestamp = {Fri, 30 Apr 2021 12:35:39 +0200}, biburl = {https://dblp.org/rec/conf/sc/PierceM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sgiot/ZhaoZL20, author = {Yao Zhao and Zhenjiang Zhang and Jian Li}, editor = {Yi{-}Bing Lin and Der{-}Jiunn Deng}, title = {A Secure Edge-Cloud Computing Framework for IoT Applications}, booktitle = {Smart Grid and Internet of Things - 4th {EAI} International Conference, SGIoT 2020, TaiChung, Taiwan, December 5-6, 2020, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {354}, pages = {70--78}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-69514-9\_7}, doi = {10.1007/978-3-030-69514-9\_7}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sgiot/ZhaoZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartiot/KhanKS20, author = {Umar Ajaib Khan and Waqas Khalid and Saifullah Saifullah}, title = {Energy Efficient Resource Allocation and Computation Offloading Strategy in a UAV-enabled Secure Edge-Cloud Computing System}, booktitle = {2020 {IEEE} International Conference on Smart Internet of Things, SmartIoT 2020, Beijing, China, August 14-16, 2020}, pages = {58--63}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SmartIoT49966.2020.00018}, doi = {10.1109/SMARTIOT49966.2020.00018}, timestamp = {Tue, 22 Sep 2020 09:48:21 +0200}, biburl = {https://dblp.org/rec/conf/smartiot/KhanKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socpar/JamilKR20, author = {Syed Usman Jamil and M. Arif Khan and Sabih ur Rehman}, editor = {Ajith Abraham and Yukio Ohsawa and Niketa Gandhi and M. Akhil Jabbar and Abdelkrim Haqiq and Se{\'{a}}n F. McLoone and Biju Issac}, title = {Edge Computing Enabled Technologies for Secure 6G Smart Environment-An Overview}, booktitle = {Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 15-18 December 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1383}, pages = {934--945}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-73689-7\_88}, doi = {10.1007/978-3-030-73689-7\_88}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socpar/JamilKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spiot/MeiF20, author = {Yang Mei and Fancheng Fu}, editor = {John MacIntyre and Jinghua Zhao and Xiaomeng Ma}, title = {Secure Big Data Computing Based on Trusted Computing and Key Management}, booktitle = {The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy - SPIoT-2020, Shanghai, China, 6-8 November 2020, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {1282}, pages = {484--489}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62743-0\_70}, doi = {10.1007/978-3-030-62743-0\_70}, timestamp = {Fri, 07 Jun 2024 09:52:08 +0200}, biburl = {https://dblp.org/rec/conf/spiot/MeiF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sscc/NambiarNTKK20, author = {Seema Nambiar and Nandakrishna and Chirag Tubakad and Adithya Kiran and Subramaniam Kalambur}, editor = {Sabu M. Thampi and Guojun Wang and Danda B. Rawat and Ryan K. L. Ko and Chun{-}I Fan}, title = {Multilevel Secure Container Deployment Framework in Edge Computing}, booktitle = {Security in Computing and Communications - 8th International Symposium, {SSCC} 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1364}, pages = {49--61}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-16-0422-5\_4}, doi = {10.1007/978-981-16-0422-5\_4}, timestamp = {Thu, 11 Feb 2021 15:38:25 +0100}, biburl = {https://dblp.org/rec/conf/sscc/NambiarNTKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/RuangwisesI20, author = {Suthee Ruangwises and Toshiya Itoh}, editor = {Jianer Chen and Qilong Feng and Jinhui Xu}, title = {Securely Computing the \emph{n}-Variable Equality Function with 2\emph{n} Cards}, booktitle = {Theory and Applications of Models of Computation, 16th International Conference, {TAMC} 2020, Changsha, China, October 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12337}, pages = {25--36}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59267-7\_3}, doi = {10.1007/978-3-030-59267-7\_3}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tamc/RuangwisesI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/Al-JodyHAK20, author = {Taha Al{-}Jody and Violeta Holmes and Alexandros Antoniades and Yazan Kazkouzeh}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Bearicade: secure access gateway to High Performance Computing systems}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {1420--1427}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00191}, doi = {10.1109/TRUSTCOM50675.2020.00191}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/Al-JodyHAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhangW20, author = {Tianyi Zhang and Jian Wang}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {576--583}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00082}, doi = {10.1109/TRUSTCOM50675.2020.00082}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhangW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhuWSZL020, author = {Luqi Zhu and Jin Wang and Lianmin Shi and Jingya Zhou and Kejie Lu and Jianping Wang}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Secure Coded Matrix Multiplication against Cooperative Attack in Edge Computing}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {547--556}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00079}, doi = {10.1109/TRUSTCOM50675.2020.00079}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/ZhuWSZL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsi-dat/NiiTO20, author = {Koji Nii and Yasuhiro Taniguchi and Kosuke Okuyama}, title = {A Cost-Effective Embedded Nonvolatile Memory with Scalable {LEE} Flash\({}^{\mbox{{\textregistered}}}\)-G2 {SONOS} for Secure IoT and Computing-in-Memory (CiM) Applications}, booktitle = {2020 International Symposium on {VLSI} Design, Automation and Test, {VLSI-DAT} 2020, Hsinchu, Taiwan, August 10-13, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VLSI-DAT49148.2020.9196270}, doi = {10.1109/VLSI-DAT49148.2020.9196270}, timestamp = {Tue, 29 Sep 2020 11:35:15 +0200}, biburl = {https://dblp.org/rec/conf/vlsi-dat/NiiTO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/HouWSLL20, author = {Tao Hou and Tao Wang and Dakun Shen and Zhuo Lu and Yao Liu}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Autonomous Security Mechanisms for High-Performance Computing Systems: Review and Analysis}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {109--129}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_6}, doi = {10.1007/978-3-030-33432-1\_6}, timestamp = {Mon, 19 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/20/HouWSLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/RaniS20, author = {Sudesh Rani and Poonam Saini}, editor = {Brij B. Gupta and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Dharma P. Agrawal and Deepak Gupta}, title = {Fog Computing: Applications and Secure Data Aggregation}, booktitle = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms}, pages = {475--492}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-22277-2\_19}, doi = {10.1007/978-3-030-22277-2\_19}, timestamp = {Sun, 12 Nov 2023 02:22:31 +0100}, biburl = {https://dblp.org/rec/books/sp/20/RaniS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/StergiouPPG20, author = {Christos Stergiou and Andreas P. Plageras and Konstantinos E. Psannis and Brij B. Gupta}, editor = {Brij B. Gupta and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Dharma P. Agrawal and Deepak Gupta}, title = {Secure Machine Learning Scenario from Big Data in Cloud Computing via Internet of Things Network}, booktitle = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms}, pages = {525--554}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-22277-2\_21}, doi = {10.1007/978-3-030-22277-2\_21}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/StergiouPPG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/VenkatesanSYCC20, author = {Sridhar Venkatesan and Shridatt Sugrim and Jason A. Youzwak and Cho{-}Yu Jason Chiang and Ritu Chadha}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {A Framework for Studying Autonomic Computing Models in Cyber Deception}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {89--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_5}, doi = {10.1007/978-3-030-33432-1\_5}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/VenkatesanSYCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TibaPZDKC20, author = {Kevin Tiba and Reza M. Parizi and Qi Zhang and Ali Dehghantanha and Hadis Karimipour and Kim{-}Kwang Raymond Choo}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {99--128}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_6}, doi = {10.1007/978-3-030-38181-3\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/TibaPZDKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/apc/PetrakisM20, author = {Euripides G. M. Petrakis and George Myrizakis}, editor = {Fatos Xhafa and Arun Kumar Sangaiah}, title = {iHome: Secure Smart Home Management in the Cloud and the Fog}, booktitle = {Advances in Edge Computing: Massive Parallel Processing and Applications}, series = {Advances in Parallel Computing}, volume = {35}, pages = {237--263}, publisher = {{IOS} Press}, year = {2020}, url = {https://doi.org/10.3233/APC200010}, doi = {10.3233/APC200010}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/apc/PetrakisM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dasc/2020, title = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9251108/proceeding}, isbn = {978-1-7281-6609-4}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14166, author = {Angelo Vera Rivera and Ahmed Refaey and Ekram Hossain}, title = {A Blockchain Framework for Secure Task Sharing in Multi-access Edge Computing}, journal = {CoRR}, volume = {abs/2006.14166}, year = {2020}, url = {https://arxiv.org/abs/2006.14166}, eprinttype = {arXiv}, eprint = {2006.14166}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14166.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-13644, author = {Sergio Rajsbaum}, title = {A Distributed Computing Perspective of Unconditionally Secure Information Transmission in Russian Cards Problems}, journal = {CoRR}, volume = {abs/2009.13644}, year = {2020}, url = {https://arxiv.org/abs/2009.13644}, eprinttype = {arXiv}, eprint = {2009.13644}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-13644.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-14747, author = {Donghyun Yu and Ruei{-}Hau Hsu and Jemin Lee}, title = {{EC-SVC:} Secure {CAN} Bus In-Vehicle Communications with Fine-grained Access Control Based on Edge Computing}, journal = {CoRR}, volume = {abs/2010.14747}, year = {2020}, url = {https://arxiv.org/abs/2010.14747}, eprinttype = {arXiv}, eprint = {2010.14747}, timestamp = {Mon, 02 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-14747.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-03461, author = {Lei Wang and Xin Liu and Yin Zhang}, title = {A Distributed and Secure Algorithm for Computing Dominant {SVD} Based on Projection Splitting}, journal = {CoRR}, volume = {abs/2012.03461}, year = {2020}, url = {https://arxiv.org/abs/2012.03461}, eprinttype = {arXiv}, eprint = {2012.03461}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-03461.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-13807, author = {Mengmeng Yang and Ivan Tjuawinata and Kwok{-}Yan Lam and Jun Zhao and Lin Sun}, title = {Secure Hot Path Crowdsourcing with Local Differential Privacy under Fog Computing Architecture}, journal = {CoRR}, volume = {abs/2012.13807}, year = {2020}, url = {https://arxiv.org/abs/2012.13807}, eprinttype = {arXiv}, eprint = {2012.13807}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-13807.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChanCLS20, author = {T.{-}H. Hubert Chan and Kai{-}Min Chung and Wei{-}Kai Lin and Elaine Shi}, title = {{MPC} for {MPC:} Secure Computation on a Massively Parallel Computing Architecture}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2020}, url = {https://eprint.iacr.org/2020/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChanCLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RakeeiM20a, author = {Mohammad Amin Rakeei and Farokhlagha Moazami}, title = {An efficient and provably secure authenticated key agreement scheme for mobile edge computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1566}, year = {2020}, url = {https://eprint.iacr.org/2020/1566}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RakeeiM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ShobanaSK20, title = {An enhanced soft computing-based formulation for secure data aggregation and efficient data processing in large-scale wireless sensor network}, journal = {Soft Comput.}, volume = {24}, number = {16}, pages = {12541--12552}, year = {2020}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s00500-020-04694-1}, doi = {10.1007/S00500-020-04694-1}, timestamp = {Sat, 24 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/ShobanaSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/VeerabathiranMK20, title = {Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption}, journal = {Soft Comput.}, volume = {24}, number = {24}, pages = {18893--18908}, year = {2020}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s00500-020-05119-9}, doi = {10.1007/S00500-020-05119-9}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/VeerabathiranMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Alqahtani19b, author = {Hassan Saad Alqahtani}, title = {A novel approach to providing secure data storage using multi cloud computing}, school = {University of Bedfordshire, {UK}}, year = {2019}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.831373}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Alqahtani19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/utcs/Kizza19, author = {Joseph Migga Kizza}, title = {Ethical and Secure Computing - {A} Concise Module, Second Edition}, series = {Undergraduate Topics in Computer Science}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-03937-0}, doi = {10.1007/978-3-030-03937-0}, isbn = {978-3-030-03936-3}, timestamp = {Wed, 02 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/utcs/Kizza19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DewantaM19, author = {Favian Dewanta and Masahiro Mambo}, title = {A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment}, journal = {{IEEE} Access}, volume = {7}, pages = {103095--103114}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2931217}, doi = {10.1109/ACCESS.2019.2931217}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DewantaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ElminaamAH19, author = {Diaa Salama Abd Elminaam and Farah Turkey Alanezi and Khalid M. Hosny}, title = {{SMCACC:} Developing an Efficient Dynamic Secure Framework for Mobile Capabilities Augmentation Using Cloud Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {120214--120237}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2929954}, doi = {10.1109/ACCESS.2019.2929954}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ElminaamAH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GeZXSS19, author = {Chunpeng Ge and Lu Zhou and Jinyue Xia and Pawel Szalachowski and Chunhua Su}, title = {A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {137266--137278}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2942651}, doi = {10.1109/ACCESS.2019.2942651}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GeZXSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiLWG19, author = {Dawei Li and Jianwei Liu and Qianhong Wu and Zhenyu Guan}, title = {Efficient {CCA2} Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {11688--11697}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2890976}, doi = {10.1109/ACCESS.2019.2890976}, timestamp = {Tue, 27 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiLWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LinCZL19, author = {Hongcheng Lin and Ye Cao and Yijie Zhong and Pengpeng Liu}, title = {Secure Computation Efficiency Maximization in NOMA-Enabled Mobile Edge Computing Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {87504--87512}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2925808}, doi = {10.1109/ACCESS.2019.2925808}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LinCZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SiabiBS19, author = {Babak Siabi and Mehdi Berenjkoub and Willy Susilo}, title = {Optimally Efficient Secure Scalar Product With Applications in Cloud Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {42798--42815}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2908230}, doi = {10.1109/ACCESS.2019.2908230}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SiabiBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WeiLWG19, author = {Zhijun Wei and Jin Li and Xianmin Wang and Chong{-}Zhi Gao}, title = {A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing}, journal = {{IEEE} Access}, volume = {7}, pages = {62785--62793}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2915794}, doi = {10.1109/ACCESS.2019.2915794}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WeiLWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/PuthalS19, author = {Deepak Puthal and Suraj Sharma}, title = {Introduction to the Special Section on Secure and Scalable Fog/Edge Computing}, journal = {Comput. Electr. Eng.}, volume = {77}, pages = {420--422}, year = {2019}, url = {https://doi.org/10.1016/j.compeleceng.2019.06.005}, doi = {10.1016/J.COMPELECENG.2019.06.005}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/PuthalS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/GopeLHQ19, author = {Prosanta Gope and Jemin Lee and Ruei{-}Hau Hsu and Tony Q. S. Quek}, title = {Anonymous Communications for Secure Device-to-Device-Aided Fog Computing: Architecture, Challenges, and Solutions}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {8}, number = {3}, pages = {10--16}, year = {2019}, url = {https://doi.org/10.1109/MCE.2019.2892285}, doi = {10.1109/MCE.2019.2892285}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/GopeLHQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/GuanZSZWMR19, author = {Zhitao Guan and Yue Zhang and Guanlin Si and Zhenyu Zhou and Jun Wu and Shahid Mumtaz and Jonathan Rodriguez}, title = {{ECOSECURITY:} Tackling Challenges Related to Data Exchange and Security: An Edge-Computing-Enabled Secure and Efficient Data Exchange Architecture for the Energy Internet}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {8}, number = {2}, pages = {61--65}, year = {2019}, url = {https://doi.org/10.1109/MCE.2018.2880824}, doi = {10.1109/MCE.2018.2880824}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/GuanZSZWMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/LuoM19, author = {Wei Luo and Wenping Ma}, title = {Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing}, journal = {Clust. Comput.}, volume = {22}, number = {2}, pages = {541--551}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-2862-z}, doi = {10.1007/S10586-018-2862-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/LuoM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/PugazhenthiC19, author = {A. Pugazhenthi and D. Chitra}, title = {Secured and memory overhead controlled data authentication mechanism in cloud computing}, journal = {Clust. Comput.}, volume = {22}, number = {6}, pages = {13559--13567}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-2000-y}, doi = {10.1007/S10586-018-2000-Y}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/PugazhenthiC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AbedSE19, author = {Sa'ed Abed and Mohammad H. Al Shayeji and Fahad Ebrahim}, title = {A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing}, journal = {Comput. Networks}, volume = {165}, year = {2019}, url = {https://doi.org/10.1016/j.comnet.2019.106956}, doi = {10.1016/J.COMNET.2019.106956}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/AbedSE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/PanCWXZ19, author = {Jingwen Pan and Jie Cui and Lu Wei and Yan Xu and Hong Zhong}, title = {Secure data sharing scheme for VANETs based on edge computing}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2019}, pages = {169}, year = {2019}, url = {https://doi.org/10.1186/s13638-019-1494-1}, doi = {10.1186/S13638-019-1494-1}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejwcn/PanCWXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/entropy/XiLSM19, author = {Ning Xi and Jing Lv and Cong Sun and Jianfeng Ma}, title = {Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments}, journal = {Entropy}, volume = {21}, number = {8}, pages = {753}, year = {2019}, url = {https://doi.org/10.3390/e21080753}, doi = {10.3390/E21080753}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entropy/XiLSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/FanLLTN19, author = {Yongkai Fan and Xiaodong Lin and Wei Liang and Gang Tan and Priyadarsi Nanda}, title = {A secure privacy preserving deduplication scheme for cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {101}, pages = {127--135}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.04.046}, doi = {10.1016/J.FUTURE.2019.04.046}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/FanLLTN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WazidDKV19, author = {Mohammad Wazid and Ashok Kumar Das and Neeraj Kumar and Athanasios V. Vasilakos}, title = {Design of secure key management and user authentication scheme for fog computing services}, journal = {Future Gener. Comput. Syst.}, volume = {91}, pages = {475--492}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.09.017}, doi = {10.1016/J.FUTURE.2018.09.017}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WazidDKV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/XiongZPZY19, author = {Hu Xiong and Yanan Zhao and Li Peng and Hao Zhang and Kuo{-}Hui Yeh}, title = {Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing}, journal = {Future Gener. Comput. Syst.}, volume = {97}, pages = {453--461}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.03.008}, doi = {10.1016/J.FUTURE.2019.03.008}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/XiongZPZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fi/CostaB19, author = {Pedro A. R. S. Costa and Marko Beko}, title = {Dependable and Secure Voting Mechanism in Edge Computing}, journal = {Future Internet}, volume = {11}, number = {12}, pages = {262}, year = {2019}, url = {https://doi.org/10.3390/fi11120262}, doi = {10.3390/FI11120262}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fi/CostaB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaip/MondalMCK19, author = {Bhaskar Mondal and Tarni Mandal and Tanupriya Choudhury and Danish Ali Khan}, title = {Use of 'A light weight secure image encryption scheme based on chaos and {DNA} computing' for encrypted audio watermarking}, journal = {Int. J. Adv. Intell. Paradigms}, volume = {13}, number = {1/2}, pages = {67--79}, year = {2019}, url = {https://doi.org/10.1504/IJAIP.2019.099944}, doi = {10.1504/IJAIP.2019.099944}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaip/MondalMCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbidm/PrabhuU19, author = {A. Prabhu and M. Usha}, title = {A secured best data centre selection in cloud computing using encryption technique}, journal = {Int. J. Bus. Intell. Data Min.}, volume = {14}, number = {1/2}, pages = {199--217}, year = {2019}, url = {https://doi.org/10.1504/IJBIDM.2019.096804}, doi = {10.1504/IJBIDM.2019.096804}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbidm/PrabhuU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijbidm/SathishkumarV19, author = {P. Sathishkumar and V. Venkatachalam}, title = {Trust management scheme for authentication in secure cloud computing using double encryption method}, journal = {Int. J. Bus. Intell. Data Min.}, volume = {15}, number = {1}, pages = {49--70}, year = {2019}, url = {https://doi.org/10.1504/IJBIDM.2017.10008075}, doi = {10.1504/IJBIDM.2017.10008075}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijbidm/SathishkumarV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/OlakanmiD19, author = {Oladayo Olufemi Olakanmi and Adedamola Dada}, title = {An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced Computing on Untrusted Platforms}, journal = {Int. J. Cloud Appl. Comput.}, volume = {9}, number = {2}, pages = {79--98}, year = {2019}, url = {https://doi.org/10.4018/IJCAC.2019040105}, doi = {10.4018/IJCAC.2019040105}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/OlakanmiD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/SwathiV19, author = {V. Swathi and M. P. Vani}, title = {Secure cloud computing using homomorphic construction}, journal = {Int. J. Cloud Comput.}, volume = {8}, number = {4}, pages = {354--370}, year = {2019}, url = {https://doi.org/10.1504/IJCC.2019.104498}, doi = {10.1504/IJCC.2019.104498}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/SwathiV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/HussainQHH19, author = {Mohammad Equebal Hussain and Mohammed Qayyum and Mohammad Rashid Hussain and Rashid Hussain}, title = {Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {11}, number = {2}, year = {2019}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/3920}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/HussainQHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/IrshadCSUAG19, author = {Azeem Irshad and Shehzad Ashraf Chaudhry and Muhammad Shafiq and Muhammad Usman and Muhammad Asif and Anwar Ghani}, title = {A provable and secure mobile user authentication scheme for mobile cloud computing services}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {14}, year = {2019}, url = {https://doi.org/10.1002/dac.3980}, doi = {10.1002/DAC.3980}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/IrshadCSUAG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdcf/ShahBK19, author = {Junaid Latief Shah and Heena Farooq Bhat and Asif Iqbal Khan}, title = {CloudIoT: Towards Seamless and Secure Integration of Cloud Computing With Internet of Things}, journal = {Int. J. Digit. Crime Forensics}, volume = {11}, number = {3}, pages = {1--22}, year = {2019}, url = {https://doi.org/10.4018/IJDCF.2019070101}, doi = {10.4018/IJDCF.2019070101}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdcf/ShahBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/SinghRMKC19, author = {Saurabh Singh and In{-}Ho Ra and Weizhi Meng and Maninder Kaur and Gi Hwan Cho}, title = {SH-BlockCC: {A} secure and efficient Internet of things smart home architecture based on cloud computing and blockchain technology}, journal = {Int. J. Distributed Sens. Networks}, volume = {15}, number = {4}, year = {2019}, url = {https://doi.org/10.1177/1550147719844159}, doi = {10.1177/1550147719844159}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/SinghRMKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/HuoJTT19, author = {Huixia Huo and Tao Jiang and Shichong Tan and Xiaoling Tao}, title = {Efficient public integrity auditing with secure deduplication in cloud computing}, journal = {Int. J. Embed. Syst.}, volume = {11}, number = {6}, pages = {764--777}, year = {2019}, url = {https://doi.org/10.1504/IJES.2019.103995}, doi = {10.1504/IJES.2019.103995}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/HuoJTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/KangYHWMXZ19, author = {Jiawen Kang and Rong Yu and Xumin Huang and Maoqiang Wu and Sabita Maharjan and Shengli Xie and Yan Zhang}, title = {Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4660--4670}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2875542}, doi = {10.1109/JIOT.2018.2875542}, timestamp = {Fri, 28 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/KangYHWMXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuYDA19, author = {Dan Liu and Zheng Yan and Wenxiu Ding and Mohammed Atiquzzaman}, title = {A Survey on Secure Data Analytics in Edge Computing}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4946--4967}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2897619}, doi = {10.1109/JIOT.2019.2897619}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiuYDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangZLBJ19, author = {Tian Wang and Guangxue Zhang and Anfeng Liu and Md. Zakirul Alam Bhuiyan and Qun Jin}, title = {A Secure IoT Service Architecture With an Efficient Balance Dynamics Based on Cloud and Edge Computing}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4831--4843}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2870288}, doi = {10.1109/JIOT.2018.2870288}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WangZLBJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuSZLDZ19, author = {Qichao Xu and Zhou Su and Qinghua Zheng and Minnan Luo and Bo Dong and Kuan Zhang}, title = {Game Theoretical Secure Caching Scheme in Multihoming Edge Computing-Enabled Heterogeneous Networks}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {3}, pages = {4536--4546}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2876417}, doi = {10.1109/JIOT.2018.2876417}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XuSZLDZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HossainM19, author = {M. Shamim Hossain and Ghulam Muhammad}, title = {Emotion recognition using secure edge and cloud computing}, journal = {Inf. Sci.}, volume = {504}, pages = {589--601}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.07.040}, doi = {10.1016/J.INS.2019.07.040}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HossainM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/DurresiSDBU19, author = {Mimoza Durresi and Anisa Subashi and Arjan Durresi and Leonard Barolli and Kazunori Uchida}, title = {Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {10}, number = {4}, pages = {1631--1640}, year = {2019}, url = {https://doi.org/10.1007/s12652-018-0759-6}, doi = {10.1007/S12652-018-0759-6}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/DurresiSDBU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/TianTYJM19, author = {Shuicheng Tian and Kai Tang and Pengfei Yang and Aifang Jia and Hailey Melvin}, title = {Secure cloud computing model for communication network management}, journal = {J. Intell. Fuzzy Syst.}, volume = {37}, number = {1}, pages = {27--34}, year = {2019}, url = {https://doi.org/10.3233/JIFS-179060}, doi = {10.3233/JIFS-179060}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/TianTYJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/MahmoodHJ19, author = {Ghassan Sabeeh Mahmood and Dong Jun Huang and Baidaa Abdulrahman Jaleel}, title = {A Secure Cloud Computing System by Using Encryption and Access Control Model}, journal = {J. Inf. Process. Syst.}, volume = {15}, number = {3}, pages = {538--549}, year = {2019}, url = {http://www.jips-k.org/q.jips?cp=pp\&pn=669}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jips/MahmoodHJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/TianNCHLD19, author = {Hui Tian and Fulin Nan and Chin{-}Chen Chang and Yongfeng Huang and Jing Lu and Yongqian Du}, title = {Privacy-preserving public auditing for secure data storage in fog-to-cloud computing}, journal = {J. Netw. Comput. Appl.}, volume = {127}, pages = {59--69}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2018.12.004}, doi = {10.1016/J.JNCA.2018.12.004}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/TianNCHLD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsan/MuthannaAKGASK19, author = {Ammar Muthanna and Abdelhamied A. Ateya and Abdukodir Khakimov and Irina A. Gudkova and Abdelrahman Abuarqoub and Konstantin E. Samouylov and Andrey Koucheryavy}, title = {Secure and Reliable IoT Networks Using Fog Computing with Software-Defined Networking and Blockchain}, journal = {J. Sens. Actuator Networks}, volume = {8}, number = {1}, pages = {15}, year = {2019}, url = {https://doi.org/10.3390/jsan8010015}, doi = {10.3390/JSAN8010015}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsan/MuthannaAKGASK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/Wang0019, author = {Tong Wang and Wenping Ma and Wei Luo}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{21306}}{\unicode{22359}}{\unicode{38142}}{\unicode{30340}}{\unicode{20449}}{\unicode{24687}}{\unicode{20849}}{\unicode{20139}}{\unicode{21450}}{\unicode{23433}}{\unicode{20840}}{\unicode{22810}}{\unicode{26041}}{\unicode{35745}}{\unicode{31639}}{\unicode{27169}}{\unicode{22411}} (Information Sharing and Secure Multi-party Computing Model Based on Blockchain)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {46}, number = {9}, pages = {162--168}, year = {2019}, url = {https://doi.org/10.11896/j.issn.1002-137X.2019.09.023}, doi = {10.11896/J.ISSN.1002-137X.2019.09.023}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/Wang0019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/XiongXCS19, author = {Lizhi Xiong and Zhihua Xia and Xianyi Chen and Hiuk Jae Shim}, title = {Secure multimedia distribution in cloud computing using re-encryption and fingerprinting}, journal = {Multim. Tools Appl.}, volume = {78}, number = {21}, pages = {30297--30313}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6981-6}, doi = {10.1007/S11042-018-6981-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/XiongXCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenZMAW19, author = {Yuanfang Chen and Yan Zhang and Sabita Maharjan and Muhammad Alam and Ting Wu}, title = {Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems}, journal = {{IEEE} Netw.}, volume = {33}, number = {4}, pages = {36--41}, year = {2019}, url = {https://doi.org/10.1109/MNET.2019.1800458}, doi = {10.1109/MNET.2019.1800458}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChenZMAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/LimbasiyaD19, author = {Trupil Limbasiya and Debasis Das}, title = {Secure message confirmation scheme based on batch verification in vehicular cloud computing}, journal = {Phys. Commun.}, volume = {34}, pages = {310--320}, year = {2019}, url = {https://doi.org/10.1016/j.phycom.2018.07.015}, doi = {10.1016/J.PHYCOM.2018.07.015}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/phycomm/LimbasiyaD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/KwonHKH19, author = {Hyunsoo Kwon and Changhee Hahn and Kyungtae Kang and Junbeom Hur}, title = {Secure deduplication with reliable and revocable key management in fog computing}, journal = {Peer-to-Peer Netw. Appl.}, volume = {12}, number = {4}, pages = {850--864}, year = {2019}, url = {https://doi.org/10.1007/s12083-018-0682-9}, doi = {10.1007/S12083-018-0682-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/KwonHKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/WangDC19, author = {Haijiang Wang and Xiaolei Dong and Zhenfu Cao}, title = {Secure and efficient encrypted keyword search for multi-user setting in cloud computing}, journal = {Peer-to-Peer Netw. Appl.}, volume = {12}, number = {1}, pages = {32--42}, year = {2019}, url = {https://doi.org/10.1007/s12083-017-0622-0}, doi = {10.1007/S12083-017-0622-0}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/WangDC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/MorimaeK19, author = {Tomoyuki Morimae and Takeshi Koshiba}, title = {Impossibility Of Perfectly-Secure Ono-Round Delegated Quantum Computing for classical client}, journal = {Quantum Inf. Comput.}, volume = {19}, number = {3{\&}4}, pages = {214--221}, year = {2019}, url = {https://doi.org/10.26421/QIC19.3-4-2}, doi = {10.26421/QIC19.3-4-2}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/MorimaeK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ria/SingamaneniN19, author = {Kranthi Kumar Singamaneni and Pasala Sanyasi Naidu}, title = {{IBLIND} Quantum Computing and {HASBE} for Secure Cloud Data Storage and Accessing}, journal = {Rev. d'Intelligence Artif.}, volume = {33}, number = {1}, pages = {33--37}, year = {2019}, url = {https://doi.org/10.18280/ria.330106}, doi = {10.18280/RIA.330106}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ria/SingamaneniN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MunivelK19, author = {E. Munivel and Kannammal Annadurai}, title = {New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5141395:1--5141395:11}, year = {2019}, url = {https://doi.org/10.1155/2019/5141395}, doi = {10.1155/2019/5141395}, timestamp = {Mon, 08 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MunivelK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YuPP19, author = {SungJin Yu and KiSung Park and Youngho Park}, title = {A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment}, journal = {Sensors}, volume = {19}, number = {16}, pages = {3598}, year = {2019}, url = {https://doi.org/10.3390/s19163598}, doi = {10.3390/S19163598}, timestamp = {Fri, 18 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/YuPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ElamathiJP19, author = {N. Elamathi and S. Jayashri and R. Pitchai}, title = {Enhanced secure communication over inter-domain routing in heterogeneous wireless networks based on analysis of {BGP} anomalies using soft computing techniques}, journal = {Soft Comput.}, volume = {23}, number = {8}, pages = {2735--2746}, year = {2019}, url = {https://doi.org/10.1007/s00500-019-03836-4}, doi = {10.1007/S00500-019-03836-4}, timestamp = {Fri, 29 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/ElamathiJP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/SujanaRPM19, author = {J. Angela Jennifa Sujana and T. Revathi and T. S. Siva Priya and K. Muneeswaran}, title = {Smart PSO-based secured scheduling approaches for scientific workflows in cloud computing}, journal = {Soft Comput.}, volume = {23}, number = {5}, pages = {1745--1765}, year = {2019}, url = {https://doi.org/10.1007/s00500-017-2897-8}, doi = {10.1007/S00500-017-2897-8}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/SujanaRPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WeiHLZ19, author = {Jianghong Wei and Xuexian Hu and Wenfen Liu and Qihui Zhang}, title = {Forward and backward secure fuzzy encryption for data sharing in cloud computing}, journal = {Soft Comput.}, volume = {23}, number = {2}, pages = {497--506}, year = {2019}, url = {https://doi.org/10.1007/s00500-017-2834-x}, doi = {10.1007/S00500-017-2834-X}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/WeiHLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/NarayananM19, author = {Munisamy Eswara Narayanan and Balasundaram Muthukumar}, title = {A highly secured and streamlined cloud collaborative editing scheme along with an efficient user revocation in cloud computing}, journal = {Softw. Pract. Exp.}, volume = {49}, number = {12}, pages = {1728--1747}, year = {2019}, url = {https://doi.org/10.1002/spe.2754}, doi = {10.1002/SPE.2754}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/NarayananM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/KuangYZC19, author = {Liwei Kuang and Laurence T. Yang and Qing Zhu and Jinjun Chen}, title = {Secure Tensor Decomposition for Big Data Using Transparent Computing Paradigm}, journal = {{IEEE} Trans. Computers}, volume = {68}, number = {4}, pages = {585--596}, year = {2019}, url = {https://doi.org/10.1109/TC.2018.2814046}, doi = {10.1109/TC.2018.2814046}, timestamp = {Fri, 12 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/KuangYZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/LiYZBLR19, author = {Shancang Li and Yong Yuan and Jun Jason Zhang and Bill Buchanan and Erwu Liu and Ramesh Ramadoss}, title = {Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {6}, number = {6}, pages = {1369--1372}, year = {2019}, url = {https://doi.org/10.1109/TCSS.2019.2954939}, doi = {10.1109/TCSS.2019.2954939}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/LiYZBLR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangL19, author = {Heecheol Yang and Jungwoo Lee}, title = {Secure Distributed Computing With Straggling Servers Using Polynomial Codes}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {1}, pages = {141--150}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2846601}, doi = {10.1109/TIFS.2018.2846601}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YangL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/RoyDCKCR19, author = {Sandip Roy and Ashok Kumar Das and Santanu Chatterjee and Neeraj Kumar and Samiran Chattopadhyay and Joel J. P. C. Rodrigues}, title = {Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {1}, pages = {457--468}, year = {2019}, url = {https://doi.org/10.1109/TII.2018.2824815}, doi = {10.1109/TII.2018.2824815}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/RoyDCKCR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/BediSG19, author = {Rajeev Kumar Bedi and Jaswinder Singh and Sunil Kumar Gupta}, title = {{MWC:} an efficient and secure multi-cloud storage approach to leverage augmentation of multi-cloud storage services on mobile devices using fog computing}, journal = {J. Supercomput.}, volume = {75}, number = {6}, pages = {3264--3287}, year = {2019}, url = {https://doi.org/10.1007/s11227-018-2304-y}, doi = {10.1007/S11227-018-2304-Y}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/BediSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/XiongWLC19, author = {Hu Xiong and Yi Wang and Wenchao Li and Chien{-}Ming Chen}, title = {Flexible, Efficient, and Secure Access Delegation in Cloud Computing}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {10}, number = {1}, pages = {2:1--2:20}, year = {2019}, url = {https://doi.org/10.1145/3318212}, doi = {10.1145/3318212}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/XiongWLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/LiCG19, author = {Bingcong Li and Tianyi Chen and Georgios B. Giannakis}, title = {Secure Mobile Edge Computing in IoT via Collaborative Online Learning}, journal = {{IEEE} Trans. Signal Process.}, volume = {67}, number = {23}, pages = {5922--5935}, year = {2019}, url = {https://doi.org/10.1109/TSP.2019.2949504}, doi = {10.1109/TSP.2019.2949504}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/LiCG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/QiuKY19a, author = {Meikang Qiu and Sun{-}Yuan Kung and Qing Yang}, title = {Editorial: {IEEE} Transactions on Sustainable Computing, Special Issue on Secure Sustainable Green Smart Computing}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {4}, number = {2}, pages = {142--144}, year = {2019}, url = {https://doi.org/10.1109/TSUSC.2018.2882011}, doi = {10.1109/TSUSC.2018.2882011}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/QiuKY19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/BaiWRH19, author = {Tong Bai and Jingjing Wang and Yong Ren and Lajos Hanzo}, title = {Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing Systems}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {6}, pages = {6074--6087}, year = {2019}, url = {https://doi.org/10.1109/TVT.2019.2912227}, doi = {10.1109/TVT.2019.2912227}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/BaiWRH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/WuL19, author = {Zhiqiang Wu and Kenli Li}, title = {VBTree: forward secure conjunctive queries over encrypted data for cloud computing}, journal = {{VLDB} J.}, volume = {28}, number = {1}, pages = {25--46}, year = {2019}, url = {https://doi.org/10.1007/s00778-018-0517-6}, doi = {10.1007/S00778-018-0517-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vldb/WuL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/MoHCS19, author = {Jiaqing Mo and Zhongwang Hu and Hang Chen and Wei Shen}, title = {An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2019}, year = {2019}, url = {https://doi.org/10.1155/2019/4520685}, doi = {10.1155/2019/4520685}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/MoHCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MofradALYCZ19, author = {Saeid Mofrad and Ishtiaq Ahmed and Shiyong Lu and Ping Yang and Heming Cui and Fengwei Zhang}, editor = {David M. Balenson}, title = {SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments}, booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019}, pages = {390--403}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3359789.3359845}, doi = {10.1145/3359789.3359845}, timestamp = {Thu, 30 May 2024 10:08:27 +0200}, biburl = {https://dblp.org/rec/conf/acsac/MofradALYCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/ShotaKSS19, author = {Johjima Shota and Kosuke Kaneko and Subodh Sharma and Kouichi Sakurai}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido}, title = {Simulation of Secure Volunteer Computing by Using Blockchain}, booktitle = {Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications, {AINA} 2019, Matsue, Japan, March 27-29, 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {926}, pages = {883--894}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-15032-7\_74}, doi = {10.1007/978-3-030-15032-7\_74}, timestamp = {Mon, 04 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/ShotaKSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/AreekijsereeTS19, author = {Katchaguy Areekijseree and Yuzhe Richard Tang and Sucheta Soundarajan}, editor = {Francesca Spezzano and Wei Chen and Xiaokui Xiao}, title = {Computing node clustering coefficients securely}, booktitle = {{ASONAM} '19: International Conference on Advances in Social Networks Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August, 2019}, pages = {532--533}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3341161.3342946}, doi = {10.1145/3341161.3342946}, timestamp = {Sat, 09 Apr 2022 12:39:00 +0200}, biburl = {https://dblp.org/rec/conf/asunam/AreekijsereeTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cata/FaiziR19a, author = {Salman Faizi and Shawon Rahman}, editor = {Gordon Lee and Ying Jin}, title = {Secured Cloud for Enterprise Computing}, booktitle = {Proceedings of 34th International Conference on Computers and Their Applications, {CATA} 2019, Honolulu, Hawaii, USA, March 18-20, 2019}, series = {EPiC Series in Computing}, volume = {58}, pages = {356--367}, publisher = {EasyChair}, year = {2019}, url = {https://doi.org/10.29007/bbrx}, doi = {10.29007/BBRX}, timestamp = {Sun, 15 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cata/FaiziR19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccece/IslamCI19, author = {S. M. Jahidul Islam and Zulfiker Haider Chaudhury and Saiful Islam}, title = {A Simple and Secured Cryptography System of Cloud Computing}, booktitle = {2019 {IEEE} Canadian Conference of Electrical and Computer Engineering, {CCECE} 2019, Edmonton, AB, Canada, May 5-8, 2019}, pages = {1--3}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCECE.2019.8861845}, doi = {10.1109/CCECE.2019.8861845}, timestamp = {Sun, 08 Aug 2021 01:40:48 +0200}, biburl = {https://dblp.org/rec/conf/ccece/IslamCI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/KrislerPBT19, author = {Brian Krisler and Partha Pratim Pal and Zech Bertilson and Dan Thomsen}, editor = {Meikang Qiu}, title = {Secure Desktop Computing in the Cloud}, booktitle = {6th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2019 / 5th {IEEE} International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019}, pages = {107--112}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSCloud/EdgeCom.2019.00-10}, doi = {10.1109/CSCLOUD/EDGECOM.2019.00-10}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/KrislerPBT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/LiguoriSW19, author = {Angelo Liguori and Peter Schoo and Marcel Winandy}, editor = {Meikang Qiu}, title = {Mind the Shift: Secure Migration of Containerized Processes in Edge Computing}, booktitle = {6th {IEEE} International Conference on Cyber Security and Cloud Computing, CSCloud 2019 / 5th {IEEE} International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019}, pages = {204--209}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSCloud/EdgeCom.2019.00027}, doi = {10.1109/CSCLOUD/EDGECOM.2019.00027}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscloud/LiguoriSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/YoshikawaDWMNML19, author = {Takashi Yoshikawa and Susumu Date and Yasuhiro Watashiba and Yuki Matsui and Kazunori Nozaki and Shinya Murakami and Chonho Lee and Masami Hida and Shinji Shimojo}, editor = {Meikang Qiu}, title = {Secure Staging System for Highly Confidential Data Built on Reconfigurable Computing Platform}, booktitle = {2019 {IEEE} International Conference on Computational Science and Engineering, {CSE} 2019, and {IEEE} International Conference on Embedded and Ubiquitous Computing, {EUC} 2019, New York, NY, USA, August 1-3, 2019}, pages = {308--313}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CSE/EUC.2019.00066}, doi = {10.1109/CSE/EUC.2019.00066}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/YoshikawaDWMNML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/CiSLDZ19, author = {Shang Ci and Liping Sun and Xiaoqing Liu and Tingli Du and Xiaoyao Zheng}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {A Secure Density Peaks Clustering Algorithm on Cloud Computing}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11982}, pages = {533--541}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37337-5\_43}, doi = {10.1007/978-3-030-37337-5\_43}, timestamp = {Wed, 08 Jan 2020 15:12:41 +0100}, biburl = {https://dblp.org/rec/conf/css/CiSLDZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/LiL19, author = {Ping Li and Jin Li}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {Secure and Dynamic Outsourcing Computation of Machine Learning in Cloud Computing}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11983}, pages = {285--292}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37352-8\_25}, doi = {10.1007/978-3-030-37352-8\_25}, timestamp = {Wed, 07 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/LiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/WangQY19, author = {Fan Wang and Zheng Qin and Hui Yin}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud Computing}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11983}, pages = {432--447}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37352-8\_38}, doi = {10.1007/978-3-030-37352-8\_38}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/WangQY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybhyg/ShakerkhanKKDBS19, author = {K. Shakerkhan and M. Kuttykadamov and S. Koibagarov and R. Duiskenova and Zh. Baibussinova and V. Sydorenko}, editor = {Sergiy Gnatyuk and Solomiia Fedushko and Zhengbing Hu and Roman Odarchenko and Yuriy Syerov and Andriy Peleshchyshyn and Igor Korobiichuk}, title = {Method for Choosing Secure Cloud Computing on the Platform of PaaS for the State Agencies Services}, booktitle = {Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019) co-located with 1st International Conference on Cyber Hygiene and Conflict Management in Global Information Networks (CyberConf 2019), Kyiv, Ukraine, November 30, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2654}, pages = {810--826}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2654/paper63.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:00 +0100}, biburl = {https://dblp.org/rec/conf/cybhyg/ShakerkhanKKDBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/KrishnanSDS19, author = {Archanaa S. Krishnan and Charles Suslowicz and Daniel Dinu and Patrick Schaumont}, editor = {J{\"{u}}rgen Teich and Franco Fummi}, title = {Secure Intermittent Computing Protocol: Protecting State Across Power Loss}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2019, Florence, Italy, March 25-29, 2019}, pages = {734--739}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/DATE.2019.8714997}, doi = {10.23919/DATE.2019.8714997}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/KrishnanSDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euspn/GahiA19, author = {Youssef Gahi and Imane El Alaoui}, editor = {Elhadi M. Shakshuki and Ansar{-}Ul{-}Haque Yasar and Haroon Malik}, title = {A Secure Multi-User Database-as-a-Service Approach for Cloud Computing Privacy}, booktitle = {The 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks {(EUSPN} 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare {(ICTH-2019)} / Affiliated Workshops, Coimbra, Portugal, November 4-7, 2019}, series = {Procedia Computer Science}, volume = {160}, pages = {811--818}, publisher = {Elsevier}, year = {2019}, url = {https://doi.org/10.1016/j.procs.2019.11.006}, doi = {10.1016/J.PROCS.2019.11.006}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euspn/GahiA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/KoumidisKEP19, author = {Konstandinos Koumidis and Panayiotis Kolios and George Ellinas and Christos G. Panayiotou}, title = {Secure Event Logging Using a Blockchain of Heterogeneous Computing Resources}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9013452}, doi = {10.1109/GLOBECOM38437.2019.9013452}, timestamp = {Wed, 04 Mar 2020 10:00:45 +0100}, biburl = {https://dblp.org/rec/conf/globecom/KoumidisKEP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YangW0CWLC19, author = {Hui Yang and Jun{-}Bo Wang and Ming Cheng and Chuanwen Chang and Jin{-}Yuan Wang and Min Lin and Ming Chen}, title = {Secure Resource Allocation in Mobile Edge Computing Systems}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9014031}, doi = {10.1109/GLOBECOM38437.2019.9014031}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YangW0CWLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/KinsyB19, author = {Michel A. Kinsy and Novak Boskov}, editor = {Houman Homayoun and Baris Taskin and Tinoosh Mohsenin and Weisheng Zhao}, title = {Secure Computing Systems Design Through Formal Micro-Contracts}, booktitle = {Proceedings of the 2019 on Great Lakes Symposium on VLSI, {GLSVLSI} 2019, Tysons Corner, VA, USA, May 9-11, 2019}, pages = {537--542}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3299874.3319447}, doi = {10.1145/3299874.3319447}, timestamp = {Wed, 10 Mar 2021 14:55:38 +0100}, biburl = {https://dblp.org/rec/conf/glvlsi/KinsyB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/AhmadZGS19, author = {Sahan Ahmad and S. M. Zobaed and Raju Gottumukkala and Mohsen Amini Salehi}, editor = {Zheng Xiao and Laurence T. Yang and Pavan Balaji and Tao Li and Keqin Li and Albert Y. Zomaya}, title = {Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data}, booktitle = {21st {IEEE} International Conference on High Performance Computing and Communications; 17th {IEEE} International Conference on Smart City; 5th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019}, pages = {662--669}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00100}, doi = {10.1109/HPCC/SMARTCITY/DSS.2019.00100}, timestamp = {Fri, 19 Nov 2021 12:28:04 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/AhmadZGS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/KongWMXYC19, author = {Tong Kong and Liming Wang and Duohe Ma and Zhen Xu and Qian Yang and Kai Chen}, editor = {Zheng Xiao and Laurence T. Yang and Pavan Balaji and Tao Li and Keqin Li and Albert Y. Zomaya}, title = {A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing}, booktitle = {21st {IEEE} International Conference on High Performance Computing and Communications; 17th {IEEE} International Conference on Smart City; 5th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019}, pages = {1825--1832}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00251}, doi = {10.1109/HPCC/SMARTCITY/DSS.2019.00251}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/KongWMXYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ZhangQYZ19, author = {Fuyou Zhang and Saiyu Qi and Haoran Yuan and Meng Zhang}, editor = {Sheng Wen and Albert Y. Zomaya and Laurence T. Yang}, title = {Secure Data Deduplication with Resistance to Side-Channel Attacks via Fog Computing}, booktitle = {Algorithms and Architectures for Parallel Processing - 19th International Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11945}, pages = {440--455}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38961-1\_39}, doi = {10.1007/978-3-030-38961-1\_39}, timestamp = {Tue, 28 Jan 2020 11:28:52 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/ZhangQYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icai2/OlowuYMF19, author = {Modebola Olowu and Chika Yinka{-}Banjo and Sanjay Misra and Hector Florez}, editor = {Hector Florez and Marcelo Le{\'{o}}n and Jos{\'{e}} Mar{\'{\i}}a D{\'{\i}}az Nafr{\'{\i}}a and Simone Belli}, title = {A Secured Private-Cloud Computing System}, booktitle = {Applied Informatics - Second International Conference, {ICAI} 2019, Madrid, Spain, November 7-9, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1051}, pages = {373--384}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32475-9\_27}, doi = {10.1007/978-3-030-32475-9\_27}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icai2/OlowuYMF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/0005ZLDWL19, author = {Wei Wu and Fuhui Zhou and Pei Li and Ping Deng and Baoyun Wang and Victor C. M. Leung}, title = {Energy-Efficient Secure NOMA-Enabled Mobile Edge Computing Networks}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8761823}, doi = {10.1109/ICC.2019.8761823}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/0005ZLDWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/CaiCTWY19, author = {Yi Cai and Xiaoming Chen and Lu Tian and Yu Wang and Huazhong Yang}, editor = {David Z. Pan}, title = {Enabling Secure in-Memory Neural Network Computing by Sparse Fast Gradient Encryption}, booktitle = {Proceedings of the International Conference on Computer-Aided Design, {ICCAD} 2019, Westminster, CO, USA, November 4-7, 2019}, pages = {1--8}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1109/ICCAD45719.2019.8942041}, doi = {10.1109/ICCAD45719.2019.8942041}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccad/CaiCTWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/HalabiBA19, author = {Talal Halabi and Martine Bella{\"{\i}}che and Adel Abusitta}, title = {Toward Secure Resource Allocation in Mobile Cloud Computing: {A} Matching Game}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019}, pages = {370--374}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCNC.2019.8685509}, doi = {10.1109/ICCNC.2019.8685509}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/HalabiBA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icct/WangWLW19, author = {Xinxin Wang and Wei Wu and Bin Lyu and Hong Wang}, title = {Delay Minimization for Secure {NOMA} Mobile-Edge Computing}, booktitle = {19th {IEEE} International Conference on Communication Technology, {ICCT} 2019, Xi'an, China, October 16-19, 2019}, pages = {1529--1534}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCT46805.2019.8947270}, doi = {10.1109/ICCT46805.2019.8947270}, timestamp = {Sat, 04 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icct/WangWLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/BulutY19, author = {Eyuphan Bulut and Murat Yuksel}, title = {Integrating In-Network Computing for Secure and Efficient Cascaded Delivery in DTNs}, booktitle = {First {IEEE} International Workshop on Network Meets Intelligent Computations, NMIC@ICDCS 2019, Dallas, TX, USA, July 7-9, 2019}, pages = {19--24}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NMIC.2019.00009}, doi = {10.1109/NMIC.2019.00009}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/BulutY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Cao00LZJZ19, author = {Chunming Cao and Jin Wang and Jianping Wang and Kejie Lu and Jingya Zhou and Admela Jukan and Wei Zhao}, title = {Optimal Task Allocation and Coding Design for Secure Coded Edge Computing}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1083--1093}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00111}, doi = {10.1109/ICDCS.2019.00111}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/Cao00LZJZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/MorPALK19, author = {Nitesh Mor and Richard Pratt and Eric Allman and Kenneth Lutz and John Kubiatowicz}, title = {Global Data Plane: {A} Federated Vision for Secure Data in Edge Computing}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1652--1663}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00164}, doi = {10.1109/ICDCS.2019.00164}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/MorPALK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/HarissSC19, author = {Khalil Hariss and Abed Ellatif Samhat and Maroun Chamoun}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {An Efficient {FHE} Scheme to Secure Cloud Computing}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {341--349}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007788803410349}, doi = {10.5220/0007788803410349}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/HarissSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsai/ChenW19, author = {Ching{-}Chiang Chen and Chia{-}Nan Wang}, editor = {Wanqing Wu and Lipo Wang and Chunlei Ji and Niansheng Chen and Qiang Sun and Xiaoyong Song and Xin Wang}, title = {Constructing of vulnerability prevention secure model for the cloud computing}, booktitle = {6th International Conference on Systems and Informatics, {ICSAI} 2019, Shanghai, China, November 2-4, 2019}, pages = {694--698}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICSAI48974.2019.9010146}, doi = {10.1109/ICSAI48974.2019.9010146}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsai/ChenW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iecon/MaLW19, author = {Renjie Ma and Jianxing Liu and Ligang Wu}, title = {Privacy-Enabled Secure Control of Fog Computing Aided Cyber-Physical Systems}, booktitle = {{IECON} 2019 - 45th Annual Conference of the {IEEE} Industrial Electronics Society, Lisbon, Portugal, October 14-17, 2019}, pages = {509--514}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IECON.2019.8927690}, doi = {10.1109/IECON.2019.8927690}, timestamp = {Tue, 23 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iecon/MaLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iske/WangZXS19, author = {DanChen Wang and Xiaosong Zhang and Yang Xu and Haiquan Song}, editor = {Li Zou and Lingling Fang and Bo Fu and Panpan Niu}, title = {A Secure Multi-Party Computing System Based on {SGX} Technology for Trusted Data Circulation}, booktitle = {14th {IEEE} International Conference on Intelligent Systems and Knowledge Engineering, {ISKE} 2019, Dalian, China, November 14-16, 2019}, pages = {90--95}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISKE47853.2019.9170307}, doi = {10.1109/ISKE47853.2019.9170307}, timestamp = {Wed, 26 Aug 2020 15:39:06 +0200}, biburl = {https://dblp.org/rec/conf/iske/WangZXS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/Zhou0LWLZ19, author = {Wei Zhou and Jin Wang and Lingzhi Li and Jianping Wang and Kejie Lu and Xiaobo Zhou}, title = {An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector}, booktitle = {2019 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom 2019, Xiamen, China, December 16-18, 2019}, pages = {100--107}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00025}, doi = {10.1109/ISPA-BDCLOUD-SUSTAINCOM-SOCIALCOM48970.2019.00025}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/Zhou0LWLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kivs/ZielinskiSZSRZM19, author = {Erich Zielinski and Julius Schulz{-}Zander and Marc Zimmermann and Christian Schellenberger and Alejandro Ram{\'{\i}}rez and Florian Zeiger and Mathias Mormul and Felicitas Hetzelt and Felix Beierle and Harald Klaus and Hanspeter Ruckstuhl and Alexander Artemenko}, title = {Secure Real-time Communication and Computing Infrastructure for Industry 4.0 - Challenges and Opportunities}, booktitle = {2019 International Conference on Networked Systems, NetSys 2019, Munich, Germany, March 18-21, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NetSys.2019.8854499}, doi = {10.1109/NETSYS.2019.8854499}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kivs/ZielinskiSZSRZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ladc/BritoBBSC19, author = {Andrey Brito and Francisco V. Brasileiro and Ignacio Blanquer and Altigran S. da Silva and Andr{\'{e}} Carvalho}, title = {{ATMOSPHERE:} Adaptive, Trustworthy, Manageable, Orchestrated, Secure, Privacy-Assuring, Hybrid Ecosystem for Resilient Cloud Computing}, booktitle = {9th Latin-American Symposium on Dependable Computing, {LADC} 2019, Natal, Brazil, November 19-21, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/LADC48089.2019.8995718}, doi = {10.1109/LADC48089.2019.8995718}, timestamp = {Fri, 04 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ladc/BritoBBSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/ZhangWZ19, author = {Lili Zhang and Wenjie Wang and Yuqing Zhang}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {203--223}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_15}, doi = {10.1007/978-3-030-30619-9\_15}, timestamp = {Tue, 27 Sep 2022 14:19:43 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/ZhangWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsoft/Koutroumpouchos19, author = {Nikos Koutroumpouchos and Christoforos Ntantogian and Sofia{-}Anna Menesidou and Kaitai Liang and Panagiotis Gouvas and Christos Xenakis and Thanassis Giannetsos}, editor = {Christian Jacquenet and Filip De Turck and Prosper Chemouil and Flavio Esposito and Olivier Festor and Walter Cerroni and Stefano Secci}, title = {Secure Edge Computing with Lightweight Control-Flow Property-based Attestation}, booktitle = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris, France, June 24-28, 2019}, pages = {84--92}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/NETSOFT.2019.8806658}, doi = {10.1109/NETSOFT.2019.8806658}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/netsoft/Koutroumpouchos19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/ParterY19, author = {Merav Parter and Eylon Yogev}, editor = {Peter Robinson and Faith Ellen}, title = {Secure Distributed Computing Made (Nearly) Optimal}, booktitle = {Proceedings of the 2019 {ACM} Symposium on Principles of Distributed Computing, {PODC} 2019, Toronto, ON, Canada, July 29 - August 2, 2019}, pages = {107--116}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3293611.3331620}, doi = {10.1145/3293611.3331620}, timestamp = {Fri, 19 Jul 2019 08:02:49 +0200}, biburl = {https://dblp.org/rec/conf/podc/ParterY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Li0N19, author = {Xiang Li and Hui Tian and Jianting Ning}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {347--354}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_22}, doi = {10.1007/978-3-030-31919-9\_22}, timestamp = {Tue, 07 May 2024 20:13:43 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Li0N19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/0006ZL19, author = {Meng Li and Liehuang Zhu and Xiaodong Lin}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {CoRide: {A} Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {305}, pages = {408--422}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37231-6\_24}, doi = {10.1007/978-3-030-37231-6\_24}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/0006ZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socc/HuangQ19, author = {Kejie Huang and Chuyun Qin}, title = {eNVM based In-memory Computing for Intelligent and Secure Computing Systems}, booktitle = {32nd {IEEE} International System-on-Chip Conference, {SOCC} 2019, Singapore, September 3-6, 2019}, pages = {348--353}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SOCC46988.2019.1570557582}, doi = {10.1109/SOCC46988.2019.1570557582}, timestamp = {Tue, 19 May 2020 13:56:11 +0200}, biburl = {https://dblp.org/rec/conf/socc/HuangQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/QinLJFAGRV19, author = {Lucy Qin and Andrei Lapets and Frederick Jansen and Peter Flockhart and Kinan Dak Albab and Ira Globus{-}Harris and Shannon Roberts and Mayank Varia}, editor = {Heather Richter Lipford}, title = {From Usability to Secure Computing and Back Again}, booktitle = {Fifteenth Symposium on Usable Privacy and Security, {SOUPS} 2019, Santa Clara, CA, USA, August 11-13, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/soups2019/presentation/qin}, timestamp = {Mon, 01 Feb 2021 08:41:56 +0100}, biburl = {https://dblp.org/rec/conf/soups/QinLJFAGRV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sqamia/BargmannT19, author = {Christian Bargmann and Marina Tropmann{-}Frick}, editor = {Zoran Budimac and Bojana Koteska}, title = {A Survey On Secure Container Isolation Approaches for Multi-Tenant Container Workloads and Serverless Computing}, booktitle = {Proceedings of the Eighth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, {SQAMIA} 2019, Ohrid, North Macedonia, September 22-25, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2508}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2508/paper-bar.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:29 +0100}, biburl = {https://dblp.org/rec/conf/sqamia/BargmannT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ChkirbeneEH19, author = {Zina Chkirbene and Aiman Erbad and Ridha Hamila}, title = {A Combined Decision for Secure Cloud Computing Based on Machine Learning and Past Information}, booktitle = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2019, Marrakesh, Morocco, April 15-18, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WCNC.2019.8885566}, doi = {10.1109/WCNC.2019.8885566}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/ChkirbeneEH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dasc/2019, title = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August 5-8, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8877880/proceeding}, isbn = {978-1-7281-3024-8}, timestamp = {Sun, 10 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2019, title = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8930388/proceeding}, isbn = {978-1-7281-2319-6}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/bdt/MishraSS19, author = {Sambit Kumar Mishra and Sampa Sahoo and Bibhudatta Sahoo}, editor = {Sherif Sakr and Albert Y. Zomaya}, title = {Secure Big Data Computing in Cloud: An Overview}, booktitle = {Encyclopedia of Big Data Technologies}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-319-63962-8\_233-1}, doi = {10.1007/978-3-319-63962-8\_233-1}, timestamp = {Thu, 22 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/bdt/MishraSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-06319, author = {Siming Wang and Xumin Huang and Rong Yu and Yan Zhang and Ekram Hossain}, title = {Permissioned Blockchain for Efficient and Secure Resource Sharing in Vehicular Edge Computing}, journal = {CoRR}, volume = {abs/1906.06319}, year = {2019}, url = {http://arxiv.org/abs/1906.06319}, eprinttype = {arXiv}, eprint = {1906.06319}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-06319.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10893, author = {Yang Zhao and Jun Zhao and Linshan Jiang and Rui Tan and Dusit Niyato}, title = {Mobile Edge Computing, Blockchain and Reputation-based Crowdsourcing IoT Federated Learning: {A} Secure, Decentralized and Privacy-preserving System}, journal = {CoRR}, volume = {abs/1906.10893}, year = {2019}, url = {http://arxiv.org/abs/1906.10893}, eprinttype = {arXiv}, eprint = {1906.10893}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-03668, author = {Sahan Ahmad and S. M. Zobaed and Raju Gottumukkala and Mohsen Amini Salehi}, title = {Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data}, journal = {CoRR}, volume = {abs/1908.03668}, year = {2019}, url = {http://arxiv.org/abs/1908.03668}, eprinttype = {arXiv}, eprint = {1908.03668}, timestamp = {Mon, 19 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-03668.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-09886, author = {Wei Wu and Fuhui Zhou and Rose Qingyang Hu and Baoyun Wang}, title = {Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile Edge Computing Networks}, journal = {CoRR}, volume = {abs/1910.09886}, year = {2019}, url = {http://arxiv.org/abs/1910.09886}, eprinttype = {arXiv}, eprint = {1910.09886}, timestamp = {Thu, 23 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-09886.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-05994, author = {Suthee Ruangwises and Toshiya Itoh}, title = {Securely Computing the n-Variable Equality Function with 2n Cards}, journal = {CoRR}, volume = {abs/1911.05994}, year = {2019}, url = {http://arxiv.org/abs/1911.05994}, eprinttype = {arXiv}, eprint = {1911.05994}, timestamp = {Mon, 02 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-05994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-01563, author = {Behzad Salami and Konstantinos Parasyris and Adri{\'{a}}n Cristal and Osman S. Unsal and Xavier Martorell and Paul Carpenter and Ra{\'{u}}l de la Cruz and Leonardo Bautista{-}Gomez and Daniel A. Jim{\'{e}}nez and Carlos {\'{A}}lvarez and S. Nabavi and Sergi Madonar and Miquel Peric{\`{a}}s and Pedro Trancoso and Mustafa Abduljabbar and Jing Chen and Pirah Noor Soomro and Madhavan Manivannan and Micha vor dem Berge and Stefan Krupop and Frank Klawonn and Al Mekhlafi and Sigrun May and Tobias Becker and Georgi Gaydadjiev and Daniel {\"{O}}dman and Hans Salomonsson and Devdatt P. Dubhashi and Oron Port and Yoav Etsion and Do Le Quoc and Christof Fetzer and Martin Kaiser and Nils Kucza and Jens Hagemeyer and Ren{\'{e}} Griessl and Lennart Tigges and Kevin Mika and A. H{\"{u}}ffmeier and Th. Jungeblu and Marcelo Pasin and Valerio Schiavoni and Isabelly Rocha and Christian G{\"{o}}ttel and Pascal Felber}, title = {LEGaTO: Low-Energy, Secure, and Resilient Toolset for Heterogeneous Computing}, journal = {CoRR}, volume = {abs/1912.01563}, year = {2019}, url = {http://arxiv.org/abs/1912.01563}, eprinttype = {arXiv}, eprint = {1912.01563}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-01563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGKP19, author = {Shweta Agrawal and Rachit Garg and Nishant Kumar and Manoj Prabhakaran}, title = {A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1262}, year = {2019}, url = {https://eprint.iacr.org/2019/1262}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IonKNPRSSSY19, author = {Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Mariana Raykova and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung}, title = {On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2019}, url = {https://eprint.iacr.org/2019/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IonKNPRSSSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QinLJFAGRV19, author = {Lucy Qin and Andrei Lapets and Frederick Jansen and Peter Flockhart and Kinan Dak Albab and Ira Globus{-}Harris and Shannon Roberts and Mayank Varia}, title = {From Usability to Secure Computing and Back Again}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2019}, url = {https://eprint.iacr.org/2019/734}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QinLJFAGRV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Veugen19, author = {Thijs Veugen}, title = {Efficient coding for secure computing with additively-homomorphic encrypted data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2019}, url = {https://eprint.iacr.org/2019/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Veugen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ch/Huang18, author = {Zhicong Huang}, title = {On Secure Cloud Computing for Genomic Data: From Storage to Analysis}, school = {EPFL, Switzerland}, year = {2018}, url = {https://doi.org/10.5075/epfl-thesis-8367}, doi = {10.5075/EPFL-THESIS-8367}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ch/Huang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Kopal18, author = {Nils Kopal}, title = {Secure Volunteer Computing for Distributed Cryptanalysis}, school = {University of Kassel, Germany}, year = {2018}, url = {http://www.upress.uni-kassel.de/katalog/abstract.php?978-3-7376-0426-0}, urn = {urn:nbn:de:0002-404276}, isbn = {978-3-7376-0426-0}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Kopal18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYHY18, author = {Qinlong Huang and Wei Yue and Yue He and Yixian Yang}, title = {Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing}, journal = {{IEEE} Access}, volume = {6}, pages = {36584--36594}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2852784}, doi = {10.1109/ACCESS.2018.2852784}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYHY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYPS18, author = {Xumin Huang and Rong Yu and Miao Pan and Lei Shu}, title = {Secure Roadside Unit Hotspot Against Eavesdropping Based Traffic Analysis in Edge Computing Based Internet of Vehicles}, journal = {{IEEE} Access}, volume = {6}, pages = {62371--62383}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2868002}, doi = {10.1109/ACCESS.2018.2868002}, timestamp = {Mon, 28 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HuangYPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYW18, author = {Qinlong Huang and Yixian Yang and Licheng Wang}, title = {Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things"}, journal = {{IEEE} Access}, volume = {6}, pages = {17245}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2823178}, doi = {10.1109/ACCESS.2018.2823178}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiWLGG18, author = {Gaolei Li and Jun Wu and Jianhua Li and Zhitao Guan and Longhua Guo}, title = {Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and {ACE}}, journal = {{IEEE} Access}, volume = {6}, pages = {11278--11288}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2799543}, doi = {10.1109/ACCESS.2018.2799543}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LiWLGG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LuoM18a, author = {Wei Luo and Wenping Ma}, title = {Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing}, journal = {{IEEE} Access}, volume = {6}, pages = {40420--40428}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2858233}, doi = {10.1109/ACCESS.2018.2858233}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LuoM18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RahmanHLHRAG18, author = {Mohamed Abdur Rahman and M. Shamim Hossain and George Loukas and Elham Hassanain and Syed Sadiqur Rahman and Mohammed F. Alhamid and Mohsen Guizani}, title = {Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications}, journal = {{IEEE} Access}, volume = {6}, pages = {72469--72478}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2881246}, doi = {10.1109/ACCESS.2018.2881246}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RahmanHLHRAG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/Tan18, author = {Syh{-}Yuan Tan}, title = {Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things"}, journal = {{IEEE} Access}, volume = {6}, pages = {22464--22465}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2827698}, doi = {10.1109/ACCESS.2018.2827698}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/Tan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhaoZ18, author = {Yingsi Zhao and Qing{-}An Zeng}, title = {Secure and Efficient Product Information Retrieval in Cloud Computing}, journal = {{IEEE} Access}, volume = {6}, pages = {14747--14754}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2816919}, doi = {10.1109/ACCESS.2018.2816919}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhaoZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/Humble18, author = {Travis S. Humble}, title = {Consumer Applications of Quantum Computing: {A} Promising Approach for Secure Computation, Trusted Data Storage, and Efficient Applications}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {7}, number = {6}, pages = {8--14}, year = {2018}, url = {https://doi.org/10.1109/MCE.2017.2755298}, doi = {10.1109/MCE.2017.2755298}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/Humble18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cem/PuthalZ18, author = {Deepak Puthal and Xuyun Zhang}, title = {Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices}, journal = {{IEEE} Consumer Electron. Mag.}, volume = {7}, number = {6}, pages = {29--30}, year = {2018}, url = {https://doi.org/10.1109/MCE.2018.2851738}, doi = {10.1109/MCE.2018.2851738}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cem/PuthalZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/PuthalONPMZ18, author = {Deepak Puthal and Mohammad S. Obaidat and Priyadarsi Nanda and Mukesh Prasad and Saraju P. Mohanty and Albert Y. Zomaya}, title = {Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing}, journal = {{IEEE} Commun. Mag.}, volume = {56}, number = {5}, pages = {60--65}, year = {2018}, url = {https://doi.org/10.1109/MCOM.2018.1700795}, doi = {10.1109/MCOM.2018.1700795}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/PuthalONPMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiZCX18, author = {Jin Li and Yinghui Zhang and Xiaofeng Chen and Yang Xiang}, title = {Secure attribute-based data sharing for resource-limited users in cloud computing}, journal = {Comput. Secur.}, volume = {72}, pages = {1--12}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.08.007}, doi = {10.1016/J.COSE.2017.08.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiZCX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/SaeedAJ18, author = {Ahmed Saeed and Ali Ahmadinia and Mike Just}, title = {Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems}, journal = {Comput.}, volume = {7}, number = {2}, pages = {31}, year = {2018}, url = {https://doi.org/10.3390/computers7020031}, doi = {10.3390/COMPUTERS7020031}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/SaeedAJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computers/Yoon18, author = {John Yoon}, title = {Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge Computing}, journal = {Comput.}, volume = {7}, number = {4}, pages = {63}, year = {2018}, url = {https://doi.org/10.3390/computers7040063}, doi = {10.3390/COMPUTERS7040063}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computers/Yoon18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/Henkel18, author = {J{\"{o}}rg Henkel}, title = {Design and Test of Energy-Efficient, High-Performance, and Secure Computing Technologies via Accelerators}, journal = {{IEEE} Des. Test}, volume = {35}, number = {1}, pages = {4}, year = {2018}, url = {https://doi.org/10.1109/MDAT.2017.2785268}, doi = {10.1109/MDAT.2017.2785268}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dt/Henkel18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HuangYS18, author = {Qinlong Huang and Yixian Yang and Mansuo Shen}, title = {Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 {(2017)} 239-249]}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {1534}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.05.041}, doi = {10.1016/J.FUTURE.2018.05.041}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HuangYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuLZDZMS18, author = {Jian Liu and Jiangtao Li and Lei Zhang and Feifei Dai and Yuanfei Zhang and Xinyu Meng and Jian Shen}, title = {Secure intelligent traffic light control using fog computing}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {817--824}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.02.017}, doi = {10.1016/J.FUTURE.2017.02.017}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuLZDZMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuZLL18, author = {Yi Liu and Yinghui Zhang and Jie Ling and Zhusong Liu}, title = {Secure and fine-grained access control on e-healthcare records in mobile cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {1020--1026}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.12.027}, doi = {10.1016/J.FUTURE.2016.12.027}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuZLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/MahmoodLCNKSR18, author = {Khalid Mahmood and Xiong Li and Shehzad Ashraf Chaudhry and Husnain Naqvi and Saru Kumari and Arun Kumar Sangaiah and Joel J. P. C. Rodrigues}, title = {Pairing based anonymous and secure key agreement protocol for smart grid edge computing infrastructure}, journal = {Future Gener. Comput. Syst.}, volume = {88}, pages = {491--500}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.06.004}, doi = {10.1016/J.FUTURE.2018.06.004}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/MahmoodLCNKSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/StergiouPKG18, author = {Christos Stergiou and Kostas E. Psannis and Byung{-}Gyu Kim and Brij B. Gupta}, title = {Secure integration of IoT and Cloud Computing}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {964--975}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.11.031}, doi = {10.1016/J.FUTURE.2016.11.031}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/StergiouPKG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangWD18, author = {Huaqun Wang and Zhiwei Wang and Josep Domingo{-}Ferrer}, title = {Anonymous and secure aggregation scheme in fog-based public cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {712--719}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.02.032}, doi = {10.1016/J.FUTURE.2017.02.032}, timestamp = {Sat, 03 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZuoSWXJ18, author = {Cong Zuo and Jun Shao and Guiyi Wei and Mande Xie and Min Ji}, title = {CCA-secure {ABE} with outsourced decryption for fog computing}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {730--738}, year = {2018}, url = {https://doi.org/10.1016/j.future.2016.10.028}, doi = {10.1016/J.FUTURE.2016.10.028}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZuoSWXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/WeiZM18, author = {Fushan Wei and Ruijie Zhang and Chuangui Ma}, title = {A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing}, journal = {Fundam. Informaticae}, volume = {157}, number = {1-2}, pages = {201--220}, year = {2018}, url = {https://doi.org/10.3233/FI-2018-1626}, doi = {10.3233/FI-2018-1626}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/WeiZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hcis/KimJ18, author = {Hyun{-}Woo Kim and Young{-}Sik Jeong}, title = {Secure Authentication-Management human-centric Scheme for trusting personal resource information on mobile cloud computing with blockchain}, journal = {Hum. centric Comput. Inf. Sci.}, volume = {8}, pages = {11}, year = {2018}, url = {https://doi.org/10.1186/s13673-018-0136-7}, doi = {10.1186/S13673-018-0136-7}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hcis/KimJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/BoussifAC18, author = {Mohamed Boussif and Noureddine Aloui and Adnene Cherif}, title = {Secured cloud computing for medical data based on watermarking and encryption}, journal = {{IET} Networks}, volume = {7}, number = {5}, pages = {294--298}, year = {2018}, url = {https://doi.org/10.1049/iet-net.2017.0180}, doi = {10.1049/IET-NET.2017.0180}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/BoussifAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcac/Ko18, author = {Hoon Ko}, title = {A Study on Secure Contents Strategies for Applications With {DRM} on Cloud Computing}, journal = {Int. J. Cloud Appl. Comput.}, volume = {8}, number = {1}, pages = {143--153}, year = {2018}, url = {https://doi.org/10.4018/IJCAC.2018010107}, doi = {10.4018/IJCAC.2018010107}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcac/Ko18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/BaharonAAAI18, author = {Mohd Rizuan Baharon and Mohd Faizal Abdollah and Nur Azman Abu and Zaheera Zainal Abidin and Ariff Idris}, title = {Secure video transcoding in Mobile Cloud Computing}, journal = {Int. J. Comput.}, volume = {17}, pages = {208--218}, year = {2018}, url = {https://doi.org/10.47839/ijc.17.4.1142}, doi = {10.47839/IJC.17.4.1142}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/BaharonAAAI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ThakareK18, author = {Vaishali R. Thakare and John Singh K}, title = {An efficient ternary tree-based {TGDH} protocol for dynamic secure group data sharing in cloud computing}, journal = {Int. J. Embed. Syst.}, volume = {10}, number = {4}, pages = {273--286}, year = {2018}, url = {https://doi.org/10.1504/IJES.2018.10014924}, doi = {10.1504/IJES.2018.10014924}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/ThakareK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/ZhuH18, author = {Shuaishuai Zhu and Yiliang Han}, title = {Secure data outsourcing scheme in cloud computing with attribute-based encryption}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {12}, number = {2}, pages = {128--136}, year = {2018}, url = {https://doi.org/10.1504/IJHPCN.2018.10015542}, doi = {10.1504/IJHPCN.2018.10015542}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/ZhuH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/LiuXYY18, author = {Xuejiao Liu and Yingjie Xia and Wei Yang and Fengli Yang}, title = {Secure and efficient querying over personal health records in cloud computing}, journal = {Neurocomputing}, volume = {274}, pages = {99--105}, year = {2018}, url = {https://doi.org/10.1016/j.neucom.2016.06.100}, doi = {10.1016/J.NEUCOM.2016.06.100}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/LiuXYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijrsda/BuchadeI18, author = {Amar Buchade and Rajesh Ingle}, title = {Secure Mechanisms for Key Shares in Cloud Computing}, journal = {Int. J. Rough Sets Data Anal.}, volume = {5}, number = {3}, pages = {21--41}, year = {2018}, url = {https://doi.org/10.4018/IJRSDA.2018070102}, doi = {10.4018/IJRSDA.2018070102}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijrsda/BuchadeI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itl/RaniA18, author = {Shalli Rani and Syed Hassan Ahmed}, title = {Secure edge computing: An architectural approach and industrial use case}, journal = {Internet Technol. Lett.}, volume = {1}, number = {5}, year = {2018}, url = {https://doi.org/10.1002/itl2.68}, doi = {10.1002/ITL2.68}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itl/RaniA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jco/PradhanJ18, author = {Dinabandhu Pradhan and Anupriya Jha}, title = {On computing a minimum secure dominating set in block graphs}, journal = {J. Comb. Optim.}, volume = {35}, number = {2}, pages = {613--631}, year = {2018}, url = {https://doi.org/10.1007/s10878-017-0197-y}, doi = {10.1007/S10878-017-0197-Y}, timestamp = {Mon, 25 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jco/PradhanJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdmdh/MarwanKO18a, author = {Mbarek Marwan and Ali Kartit and Hassan Ouahmane}, title = {A Secured Data Processing Technique for Effective Utilization of Cloud Computing}, journal = {J. Data Min. Digit. Humanit.}, volume = {2018}, year = {2018}, url = {https://doi.org/10.46298/jdmdh.4085}, doi = {10.46298/JDMDH.4085}, timestamp = {Tue, 14 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdmdh/MarwanKO18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jeco/MarwanKO18, author = {Mbarek Marwan and Ali Kartit and Hassan Ouahmane}, title = {A Framework to Secure Medical Image Storage in Cloud Computing Environment}, journal = {J. Electron. Commer. Organ.}, volume = {16}, number = {1}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.4018/JECO.2018010101}, doi = {10.4018/JECO.2018010101}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jeco/MarwanKO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/SaleemKSAK18, author = {Ahsan Saleem and Abid Khan and Furqan Shahid and Masoom Alam and Muhammad Khurram Khan}, title = {Recent advancements in garbled computing: How far have we come towards achieving secure, efficient and reusable garbled circuits}, journal = {J. Netw. Comput. Appl.}, volume = {108}, pages = {1--19}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.02.006}, doi = {10.1016/J.JNCA.2018.02.006}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/SaleemKSAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/DongZDZG18, author = {Ping Dong and Tao Zheng and Xiaojiang Du and Hongke Zhang and Mohsen Guizani}, title = {{SVCC-HSR:} Providing Secure Vehicular Cloud Computing for Intelligent High-Speed Rail}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {64--71}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700330}, doi = {10.1109/MNET.2018.1700330}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/DongZDZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/FanWSLY18, author = {Kai Fan and Xin Wang and Katsuya Suto and Hui Li and Yintang Yang}, title = {Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {52--57}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700327}, doi = {10.1109/MNET.2018.1700327}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/FanWSLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/HeZLWH18, author = {Jackson He and Yaoxue Zhang and Ju Lu and Ming Wu and Fujin Huang}, title = {Block-Stream as a Service: {A} More Secure, Nimble, and Dynamically Balanced Cloud Service Model for Ambient Computing}, journal = {{IEEE} Netw.}, volume = {32}, number = {1}, pages = {126--132}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700167}, doi = {10.1109/MNET.2018.1700167}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/HeZLWH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ShaoW18, author = {Jun Shao and Guiyi Wei}, title = {Secure Outsourced Computation in Connected Vehicular Cloud Computing}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {36--41}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700345}, doi = {10.1109/MNET.2018.1700345}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ShaoW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/YangNLP18, author = {Yixian Yang and Xinxin Niu and Lixiang Li and Haipeng Peng}, title = {A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing}, journal = {{IEEE} Netw.}, volume = {32}, number = {3}, pages = {14--19}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700324}, doi = {10.1109/MNET.2018.1700324}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/YangNLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/AlpernasFFRSSW18, author = {Kalev Alpernas and Cormac Flanagan and Sadjad Fouladi and Leonid Ryzhyk and Mooly Sagiv and Thomas Schmitz and Keith Winstein}, title = {Secure serverless computing using dynamic information flow control}, journal = {Proc. {ACM} Program. Lang.}, volume = {2}, number = {{OOPSLA}}, pages = {118:1--118:26}, year = {2018}, url = {https://doi.org/10.1145/3276488}, doi = {10.1145/3276488}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/AlpernasFFRSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/MengWWW18, author = {Tianhui Meng and Katinka Wolter and Huaming Wu and Qiushi Wang}, title = {A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks}, journal = {Pervasive Mob. Comput.}, volume = {45}, pages = {4--18}, year = {2018}, url = {https://doi.org/10.1016/j.pmcj.2018.01.007}, doi = {10.1016/J.PMCJ.2018.01.007}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/MengWWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/FanWJLY18, author = {Kai Fan and Wei Wang and Wei Jiang and Hui Li and Yintang Yang}, title = {Secure ultra-lightweight {RFID} mutual authentication protocol based on transparent computing for IoV}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {4}, pages = {723--734}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0553-9}, doi = {10.1007/S12083-017-0553-9}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/FanWJLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SharmaK18, author = {Geeta Sharma and Sheetal Kalra}, title = {Identity based secure authentication scheme based on quantum key distribution for cloud computing}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {2}, pages = {220--234}, year = {2018}, url = {https://doi.org/10.1007/s12083-016-0528-2}, doi = {10.1007/S12083-016-0528-2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SharmaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/LeeLKKLK18, author = {Seongkee Lee and Sanghoon Lee and Taein Kang and Miyoung Kwon and Nohbok Lee and Hoon{-}Kyu Kim}, title = {Resiliency of mobile {OS} security for secure personal ubiquitous computing}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {1}, pages = {23--34}, year = {2018}, url = {https://doi.org/10.1007/s00779-017-1098-x}, doi = {10.1007/S00779-017-1098-X}, timestamp = {Sat, 09 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/puc/LeeLKKLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sap/OppermannTTS18, author = {Alexander Oppermann and Federico Grasso Toro and Florian Thiel and Jean{-}Pierre Seifert}, title = {Secure Cloud Computing: Reference Architecture for Measuring Instrument under Legal Control}, journal = {Secur. Priv.}, volume = {1}, number = {3}, year = {2018}, url = {https://doi.org/10.1002/spy2.18}, doi = {10.1002/SPY2.18}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sap/OppermannTTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuYWXD18, author = {Guoxiu Liu and Geng Yang and Huaqun Wang and Yang Xiang and Hua Dai}, title = {A Novel Secure Scheme for Supporting Complex {SQL} Queries over Encrypted Databases in Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7383514:1--7383514:15}, year = {2018}, url = {https://doi.org/10.1155/2018/7383514}, doi = {10.1155/2018/7383514}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuYWXD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangSY0RZ18, author = {Yinghui Zhang and Haonan Su and Menglei Yang and Dong Zheng and Fang Ren and Qinglan Zhao}, title = {Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {9081814:1--9081814:12}, year = {2018}, url = {https://doi.org/10.1155/2018/9081814}, doi = {10.1155/2018/9081814}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangSY0RZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuangYS18, author = {Qinlong Huang and Yixian Yang and Yuxiang Shi}, title = {SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing}, journal = {Sensors}, volume = {18}, number = {2}, pages = {666}, year = {2018}, url = {https://doi.org/10.3390/s18020666}, doi = {10.3390/S18020666}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HuangYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/Mora-GimenoMMV18, author = {Francisco Jos{\'{e}} Mora{-}Gimeno and Higinio Mora Mora and Diego Marcos{-}Jorquera and Bruno Volckaert}, title = {A Secure Multi-Tier Mobile Edge Computing Model for Data Processing Offloading Based on Degree of Trust}, journal = {Sensors}, volume = {18}, number = {10}, pages = {3211}, year = {2018}, url = {https://doi.org/10.3390/s18103211}, doi = {10.3390/S18103211}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/Mora-GimenoMMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/XuTFZXC18, author = {Qian Xu and Chengxiang Tan and Zhijie Fan and Wenye Zhu and Ya Xiao and Fujia Cheng}, title = {Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation}, journal = {Sensors}, volume = {18}, number = {5}, pages = {1609}, year = {2018}, url = {https://doi.org/10.3390/s18051609}, doi = {10.3390/S18051609}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/XuTFZXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ChenD18, author = {Chin{-}Ling Chen and Yong{-}Yuan Deng}, title = {A fair and secure group buying system based on arbitration computing mechanism}, journal = {Soft Comput.}, volume = {22}, number = {1}, pages = {119--135}, year = {2018}, url = {https://doi.org/10.1007/s00500-016-2313-9}, doi = {10.1007/S00500-016-2313-9}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/ChenD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ZhangYZLWC18, author = {Yinghui Zhang and Menglei Yang and Dong Zheng and Pengzhen Lang and Axin Wu and Chen Chen}, title = {Efficient and secure big data storage system with leakage resilience in cloud computing}, journal = {Soft Comput.}, volume = {22}, number = {23}, pages = {7763--7772}, year = {2018}, url = {https://doi.org/10.1007/s00500-018-3435-z}, doi = {10.1007/S00500-018-3435-Z}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/ZhangYZLWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/software/MakitaloOKAKM17, author = {Niko M{\"{a}}kitalo and Aleksandr Ometov and Joona Kannisto and Sergey Andreev and Yevgeni Koucheryavy and Tommi Mikkonen}, title = {Safe, Secure Executions at the Network Edge: Coordinating Cloud, Edge, and Fog Computing}, journal = {{IEEE} Softw.}, volume = {35}, number = {1}, pages = {30--37}, year = {2018}, url = {https://doi.org/10.1109/MS.2017.4541037}, doi = {10.1109/MS.2017.4541037}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/software/MakitaloOKAKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/SiddiquiLP18, author = {Zahid Ali Siddiqui and Jeong{-}A Lee and Unsang Park}, title = {SEDC-Based Hardware-Level Fault Tolerance and Fault Secure Checker Design for Big Data and Cloud Computing}, journal = {Sci. Program.}, volume = {2018}, pages = {7306837:1--7306837:16}, year = {2018}, url = {https://doi.org/10.1155/2018/7306837}, doi = {10.1155/2018/7306837}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sp/SiddiquiLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/JaleelAS18, author = {Abdul Jaleel and Shazia Arshad and Muhammad Shoaib}, title = {A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm: Supporting Dynamic Adaptation of Self-* Services from an Autonomic Cloud}, journal = {Symmetry}, volume = {10}, number = {5}, pages = {141}, year = {2018}, url = {https://doi.org/10.3390/sym10050141}, doi = {10.3390/SYM10050141}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/JaleelAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/LiuTCL18, author = {Chao{-}Liang Liu and Wang{-}Jui Tsai and Ting{-}Yi Chang and Ta{-}Ming Liu}, title = {Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments}, journal = {Symmetry}, volume = {10}, number = {4}, pages = {84}, year = {2018}, url = {https://doi.org/10.3390/sym10040084}, doi = {10.3390/SYM10040084}, timestamp = {Tue, 14 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/LiuTCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiSHGXX18, author = {Ruixuan Li and Chenglin Shen and Heng He and Xiwu Gu and Zhiyong Xu and Cheng{-}Zhong Xu}, title = {A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {2}, pages = {344--357}, year = {2018}, url = {https://doi.org/10.1109/TCC.2017.2649685}, doi = {10.1109/TCC.2017.2649685}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/LiSHGXX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/WeiLH18, author = {Jianghong Wei and Wenfen Liu and Xuexian Hu}, title = {Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {4}, pages = {1136--1148}, year = {2018}, url = {https://doi.org/10.1109/TCC.2016.2545668}, doi = {10.1109/TCC.2016.2545668}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/WeiLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/FuLCBZ18, author = {Junsong Fu and Yun Liu and Han{-}Chieh Chao and Bharat K. Bhargava and Zhen{-}Jiang Zhang}, title = {Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {10}, pages = {4519--4528}, year = {2018}, url = {https://doi.org/10.1109/TII.2018.2793350}, doi = {10.1109/TII.2018.2793350}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/FuLCBZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/SuXLPPL18, author = {Zhou Su and Qichao Xu and Jun Luo and Huayan Pu and Yan Peng and Rongxing Lu}, title = {A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {10}, pages = {4579--4589}, year = {2018}, url = {https://doi.org/10.1109/TII.2018.2849984}, doi = {10.1109/TII.2018.2849984}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/SuXLPPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/NkenyereyePR18, author = {Lewis Nkenyereye and Youngho Park and Kyung{-}Hyune Rhee}, title = {Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing}, journal = {J. Supercomput.}, volume = {74}, number = {3}, pages = {1024--1044}, year = {2018}, url = {https://doi.org/10.1007/s11227-016-1773-0}, doi = {10.1007/S11227-016-1773-0}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/NkenyereyePR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ZhangSWZJ18, author = {Yuanyu Zhang and Yulong Shen and Hua Wang and Yanchun Zhang and Xiaohong Jiang}, title = {On Secure Wireless Communications for Service Oriented Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {11}, number = {2}, pages = {318--328}, year = {2018}, url = {https://doi.org/10.1109/TSC.2015.2478453}, doi = {10.1109/TSC.2015.2478453}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ZhangSWZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wc/HeYZY18, author = {Ying He and F. Richard Yu and Nan Zhao and Hongxi Yin}, title = {Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching, and Device-to-Device Communications}, journal = {{IEEE} Wirel. Commun.}, volume = {25}, number = {3}, pages = {103--109}, year = {2018}, url = {https://doi.org/10.1109/MWC.2018.1700274}, doi = {10.1109/MWC.2018.1700274}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wc/HeYZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LiJWFZW18, author = {Ye Li and Zoe Lin Jiang and Xuan Wang and Jun{-}bin Fang and En Zhang and Xianmin Wang}, title = {Securely Outsourcing {ID3} Decision Tree in Cloud Computing}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {2385150:1--2385150:10}, year = {2018}, url = {https://doi.org/10.1155/2018/2385150}, doi = {10.1155/2018/2385150}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/LiJWFZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/XuWYRZZ18, author = {Yang Xu and Guojun Wang and Jidian Yang and Ju Ren and Yaoxue Zhang and Cheng Zhang}, title = {Towards Secure Network Computing Services for Lightweight Clients Using Blockchain}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2018}, pages = {2051693:1--2051693:12}, year = {2018}, url = {https://doi.org/10.1155/2018/2051693}, doi = {10.1155/2018/2051693}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/XuWYRZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/WangZSXC18, author = {Xu An Wang and Shuaishuai Zhu and Arun Kumar Sangaiah and Shuai Xue and Yunfei Cao}, editor = {Fatos Xhafa and Fang{-}Yie Leu and Massimo Ficco and Chao{-}Tung Yang}, title = {More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing}, booktitle = {Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings of the 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC-2018, Taichung, Taiwan, 27-29 October}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {24}, pages = {293--299}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02607-3\_26}, doi = {10.1007/978-3-030-02607-3\_26}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/WangZSXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShenL0HCZ18, author = {Jian Shen and Dengzhi Liu and Xiaofeng Chen and Xinyi Huang and Jiageng Chen and Mingwu Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {417--430}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_24}, doi = {10.1007/978-3-319-93638-3\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ShenL0HCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/LiCWG18, author = {Bingcong Li and Tianyi Chen and Xin Wang and Georgios B. Giannakis}, editor = {Michael B. Matthews}, title = {Secure Edge Computing in IoT via Online Learning}, booktitle = {52nd Asilomar Conference on Signals, Systems, and Computers, {ACSSC} 2018, Pacific Grove, CA, USA, October 28-31, 2018}, pages = {2149--2153}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ACSSC.2018.8645223}, doi = {10.1109/ACSSC.2018.8645223}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acssc/LiCWG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amia/OxleyRCWC18, author = {Peter Oxley and John Ruffing and Thomas R. Campion Jr. and Terrie R. Wheeler and Curtis L. Cole}, title = {Design and Implementation of a Secure Computing Environment for Analysis of Sensitive Data at an Academic Medical Center}, booktitle = {{AMIA} 2018, American Medical Informatics Association Annual Symposium, San Francisco, CA, November 3-7, 2018}, publisher = {{AMIA}}, year = {2018}, url = {https://knowledge.amia.org/67852-amia-1.4259402/t004-1.4263758/t004-1.4263759/2976792-1.4263862/2976873-1.4263859}, timestamp = {Wed, 17 Apr 2024 11:47:15 +0200}, biburl = {https://dblp.org/rec/conf/amia/OxleyRCWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/WinderickxSM18, author = {Jori Winderickx and Dave Singel{\'{e}}e and Nele Mentens}, title = {HeComm: End-to-end secured communication in a heterogeneous IoT environment via fog computing}, booktitle = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference, {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CCNC.2018.8319245}, doi = {10.1109/CCNC.2018.8319245}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/WinderickxSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cf/CristalUMCCBJAS18, author = {Adri{\'{a}}n Cristal and Osman S. Unsal and Xavier Martorell and Paul Carpenter and Ra{\'{u}}l de la Cruz and Leonardo Bautista{-}Gomez and Daniel Jim{\'{e}}nez{-}Gonz{\'{a}}lez and Carlos {\'{A}}lvarez and Behzad Salami and Sergi Madonar and Miquel Peric{\`{a}}s and Pedro Trancoso and Micha vor dem Berge and Gunnar Billung{-}Meyer and Stefan Krupop and Wolfgang Christmann and Frank Klawonn and Amani Mihklafi and Tobias Becker and Georgi Gaydadjiev and Hans Salomonsson and Devdatt P. Dubhashi and Oron Port and Yoav Etsion and Vesna Nowack and Christof Fetzer and Jens Hagemeyer and Thorsten Jungeblut and Nils Kucza and Martin Kaiser and Mario Porrmann and Marcelo Pasin and Valerio Schiavoni and Isabelly Rocha and Christian G{\"{o}}ttel and Pascal Felber}, editor = {David R. Kaeli and Miquel Peric{\`{a}}s}, title = {LEGaTO: towards energy-efficient, secure, fault-tolerant toolset for heterogeneous computing}, booktitle = {Proceedings of the 15th {ACM} International Conference on Computing Frontiers, {CF} 2018, Ischia, Italy, May 08-10, 2018}, pages = {276--278}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3203217.3205339}, doi = {10.1145/3203217.3205339}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cf/CristalUMCCBJAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cicba/TribediSR18, author = {Debarpan Tribedi and Dipanwita Sadhukhan and Sangram Ray}, editor = {Jyotsna Kumar Mandal and Somnath Mukhopadhyay and Paramartha Dutta and Kousik Dasgupta}, title = {Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme with Outsourced Verification in Cloud Computing}, booktitle = {Computational Intelligence, Communications, and Business Analytics - Second International Conference, {CICBA} 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part {II}}, series = {Communications in Computer and Information Science}, volume = {1031}, pages = {411--424}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-8581-0\_33}, doi = {10.1007/978-981-13-8581-0\_33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cicba/TribediSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/BazmLSM18, author = {Mohammad{-}Mahdi Bazm and Marc Lacoste and Mario S{\"{u}}dholt and Jean{-}Marc Menaud}, title = {Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers}, booktitle = {2018 {IEEE} International Conference on Cloud Computing Technology and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018}, pages = {239--242}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CloudCom2018.2018.00053}, doi = {10.1109/CLOUDCOM2018.2018.00053}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/BazmLSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BrasileiroBB18, author = {Francisco V. Brasileiro and Andrey Brito and Ignacio Blanquer}, title = {{ATMOSPHERE:} Adaptive, Trustworthy, Manageable, Orchestrated, Secure, Privacy-Assuring, Hybrid Ecosystem for REsilient Cloud Computing}, booktitle = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks Workshops, {DSN} Workshops 2018, Luxembourg, June 25-28, 2018}, pages = {51--52}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.ieeecomputersociety.org/10.1109/DSN-W.2018.00025}, doi = {10.1109/DSN-W.2018.00025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/BrasileiroBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/AlrowailyL18, author = {Mohammed Alrowaily and Zhuo Lu}, title = {Secure Edge Computing in IoT Systems: Review and Case Studies}, booktitle = {2018 {IEEE/ACM} Symposium on Edge Computing, {SEC} 2018, Seattle, WA, USA, October 25-27, 2018}, pages = {440--444}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SEC.2018.00060}, doi = {10.1109/SEC.2018.00060}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edge/AlrowailyL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edge/HuangCCZ18, author = {Baiyi Huang and Xiuzhen Cheng and Yuan Cao and Le Zhang}, title = {Lightweight Hardware Based Secure Authentication Scheme for Fog Computing}, booktitle = {2018 {IEEE/ACM} Symposium on Edge Computing, {SEC} 2018, Seattle, WA, USA, October 25-27, 2018}, pages = {433--439}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SEC.2018.00059}, doi = {10.1109/SEC.2018.00059}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/edge/HuangCCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/OppermannETS18, author = {Alexander Oppermann and Marko Esche and Florian Thiel and Jean{-}Pierre Seifert}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology}, booktitle = {Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, FedCSIS 2018, Pozna{\'{n}}, Poland, September 9-12, 2018}, series = {Annals of Computer Science and Information Systems}, volume = {15}, pages = {593--602}, year = {2018}, url = {https://doi.org/10.15439/2018F226}, doi = {10.15439/2018F226}, timestamp = {Tue, 23 Apr 2024 10:05:32 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/OppermannETS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/QianLPWAC18, author = {Kai Qian and Dan Chia{-}Tien Lo and Reza M. Parizi and Fan Wu and Emmanuel Agu and Bei{-}Tseng Chu}, title = {Authentic Learning Secure Software Development {(SSD)} in Computing Education}, booktitle = {{IEEE} Frontiers in Education Conference, {FIE} 2018, San Jose, CA, USA, October 3-6, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/FIE.2018.8659217}, doi = {10.1109/FIE.2018.8659217}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fie/QianLPWAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmec/AlmajaliSAE18, author = {Sufyan Almajali and Haythem Bany Salameh and Moussa Ayyash and Hany Elgala}, title = {A framework for efficient and secured mobility of IoT devices in mobile edge computing}, booktitle = {Third International Conference on Fog and Mobile Edge Computing, {FMEC} 2018, Barcelona, Spain, April 23-26, 2018}, pages = {58--62}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/FMEC.2018.8364045}, doi = {10.1109/FMEC.2018.8364045}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fmec/AlmajaliSAE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fnss/QureshiMR18, author = {Amna Qureshi and David Meg{\'{\i}}as and Helena Rif{\`{a}}{-}Pous}, editor = {Robin Doss and Selwyn Piramuthu and Wei Zhou}, title = {VSPReP: Verifiable, Secure and Privacy-Preserving Remote Polling with Untrusted Computing Devices}, booktitle = {Future Network Systems and Security - 4th International Conference, {FNSS} 2018, Paris, France, July 9-11, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {878}, pages = {61--79}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94421-0\_5}, doi = {10.1007/978-3-319-94421-0\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fnss/QureshiMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/PesaraPA18, author = {Akshay Chandra Pesara and Vikram Patil and Pradeep K. Atrey}, editor = {Panagiotis Bouros and Matthias Renz and Dimitris Sacharidis}, title = {Secure Computing of {GPS} Trajectory Similarity: {A} Review}, booktitle = {Proceedings of the 2nd {ACM} {SIGSPATIAL} Workshop on Recommendations for Location-based Services and Social Networks, LocalRec@SIGSPATIAL 2018, Seattle, WA, USA, November 6, 2018}, pages = {3:1--3:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3282825.3282832}, doi = {10.1145/3282825.3282832}, timestamp = {Wed, 29 May 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/gis/PesaraPA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HuangLY18, author = {Qinlong Huang and Nan Li and Yixian Yang}, title = {{DACSC:} Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8648113}, doi = {10.1109/GLOCOM.2018.8648113}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HuangLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiaoFGHOK18, author = {Qi Liao and Thomas Fischer and Jack Gao and Faisal Hafeez and Carl Oechsner and Jana Knode}, title = {A Secure End-to-End Cloud Computing Solution for Emergency Management with UAVs}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8648094}, doi = {10.1109/GLOCOM.2018.8648094}, timestamp = {Tue, 26 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiaoFGHOK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/green/KlineJ18, author = {Donald Kline Jr. and Alex K. Jones}, title = {Achieving Secure, Reliable, and Sustainable Next Generation Computing Memories}, booktitle = {Ninth International Green and Sustainable Computing Conference, {IGSC} 2018, Pittsburgh, PA, USA, October 22-24, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IGCC.2018.8752128}, doi = {10.1109/IGCC.2018.8752128}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/green/KlineJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/green/ZhangY18, author = {Zhiming Zhang and Qiaoyan Yu}, title = {A Survey on Energy Efficiency Techniques for Secure Computing Systems}, booktitle = {Ninth International Green and Sustainable Computing Conference, {IGSC} 2018, Pittsburgh, PA, USA, October 22-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/IGCC.2018.8752109}, doi = {10.1109/IGCC.2018.8752109}, timestamp = {Thu, 04 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/green/ZhangY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/i2mtc/OppermannTTS18, author = {Alexander Oppermann and Federico Grasso Toro and Florian Thiel and Jean{-}Pierre Seifert}, title = {Secure cloud computing: Continuous anomaly detection approach in legal metrology}, booktitle = {{IEEE} International Instrumentation and Measurement Technology Conference, {I2MTC} 2018, Houston, TX, USA, May 14-17, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/I2MTC.2018.8409767}, doi = {10.1109/I2MTC.2018.8409767}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/i2mtc/OppermannTTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ChenFXSYW18, author = {Zhenzhu Chen and Anmin Fu and Ke Xiao and Mang Su and Yan Yu and Yongli Wang}, title = {Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422326}, doi = {10.1109/ICC.2018.8422326}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/ChenFXSYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/DangDOWLL18, author = {Lintao Dang and Mianxiong Dong and Kaoru Ota and Jun Wu and Jianhua Li and Gaolei Li}, title = {Resource-Efficient Secure Data Sharing for Information Centric E-Health System Using Fog Computing}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422844}, doi = {10.1109/ICC.2018.8422844}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/DangDOWLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/AdebayoRN018, author = {Abdulhamid Adebayo and Danda B. Rawat and Lina Ni and Min Song}, title = {Group-Query-as-a-Service for Secure Low-Latency Opportunistic {RF} Spectrum Access in Mobile Edge Computing Enabled Wireless Networks}, booktitle = {27th International Conference on Computer Communication and Networks, {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018}, pages = {1--7}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCN.2018.8487432}, doi = {10.1109/ICCCN.2018.8487432}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccn/AdebayoRN018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/UchibayashiASH18, author = {Toshihiro Uchibayashi and Bernady O. Apduhan and Takuo Suganuma and Masahiro Hiji}, editor = {Osvaldo Gervasi and Beniamino Murgante and Sanjay Misra and Elena N. Stankova and Carmelo Maria Torre and Ana Maria A. C. Rocha and David Taniar and Bernady O. Apduhan and Eufemia Tarantino and Yeonseung Ryu}, title = {Toward a Secure {VM} Migration Control Mechanism Using Blockchain Technique for Cloud Computing Environment}, booktitle = {Computational Science and Its Applications - {ICCSA} 2018 - 18th International Conference, Melbourne, VIC, Australia, July 2-5, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10962}, pages = {177--186}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95168-3\_12}, doi = {10.1007/978-3-319-95168-3\_12}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/UchibayashiASH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icl/El-SofanyEF18, author = {Hosam F. El{-}Sofany and Samir Abou El{-}Seoud and Rahma Tallah H. Farouk}, editor = {Michael E. Auer and Thrasyvoulos Tsiatsos}, title = {Studying the Effect of Using E-Learning Through Secure Cloud Computing Systems}, booktitle = {The Challenges of the Digital Transformation in Education - Proceedings of the 21st International Conference on Interactive Collaborative Learning {(ICL} 2018) - Volume 2, Kos Island, Greece, 25-28 September 2018}, series = {Advances in Intelligent Systems and Computing}, volume = {917}, pages = {54--63}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-11935-5\_6}, doi = {10.1007/978-3-030-11935-5\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icl/El-SofanyEF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/Das18, author = {Debasis Das}, title = {Secure cloud computing algorithm using homomorphic encryption and multi-party computation}, booktitle = {2018 International Conference on Information Networking, {ICOIN} 2018, Chiang Mai, Thailand, January 10-12, 2018}, pages = {391--396}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICOIN.2018.8343147}, doi = {10.1109/ICOIN.2018.8343147}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icoin/Das18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/HammamiBY18, author = {Hamza Hammami and Hanen Brahmi and Sadok Ben Yahia}, title = {Secured outsourcing towards a cloud computing environment based on {DNA} cryptography}, booktitle = {2018 International Conference on Information Networking, {ICOIN} 2018, Chiang Mai, Thailand, January 10-12, 2018}, pages = {31--36}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICOIN.2018.8343079}, doi = {10.1109/ICOIN.2018.8343079}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/HammamiBY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/YuRA18, author = {Qian Yu and Netanel Raviv and Amir Salman Avestimehr}, title = {Coding for Private and Secure Multiparty Computing}, booktitle = {{IEEE} Information Theory Workshop, {ITW} 2018, Guangzhou, China, November 25-29, 2018}, pages = {1--5}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ITW.2018.8613443}, doi = {10.1109/ITW.2018.8613443}, timestamp = {Wed, 21 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/YuRA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/new2an/Davydov18, author = {Viacheslav Davydov}, editor = {Olga Galinina and Sergey Andreev and Sergey I. Balandin and Yevgeni Koucheryavy}, title = {System for Secure Computing Based on Homomorphism with Reduced Polynomial Power}, booktitle = {Internet of Things, Smart Spaces, and Next Generation Networks and Systems - 18th International Conference, {NEW2AN} 2018, and 11th Conference, ruSMART 2018, St. Petersburg, Russia, August 27-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11118}, pages = {312--317}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01168-0\_29}, doi = {10.1007/978-3-030-01168-0\_29}, timestamp = {Mon, 16 Sep 2019 15:31:29 +0200}, biburl = {https://dblp.org/rec/conf/new2an/Davydov18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/IslamFH18, author = {Torikul Islam and Jannatul Ferdush and M. M. A. Hashem}, title = {Secured Cloud Computing Outsourcing: {A} Case Study of Constrained Linear Least Square Problem}, booktitle = {5th International Conference on Networking, Systems and Security, NSysS 2018, Dhaka, Bangladesh, December 18-20, 2018}, pages = {141--145}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/NSysS.2018.8631378}, doi = {10.1109/NSYSS.2018.8631378}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/IslamFH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/BhadauriaC18, author = {Rishabh Bhadauria and Ashish Choudhury}, editor = {Calvin Newport and Idit Keidar}, title = {Brief Announcement: Asynchronous Secure Distributed Computing with Transferrable Non-equivocation Revisited}, booktitle = {Proceedings of the 2018 {ACM} Symposium on Principles of Distributed Computing, {PODC} 2018, Egham, United Kingdom, July 23-27, 2018}, pages = {265--267}, publisher = {{ACM}}, year = {2018}, url = {https://dl.acm.org/citation.cfm?id=3212777}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/BhadauriaC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/Scheideler18, author = {Christian Scheideler}, editor = {Posco Tso and Amitabh Trehan and Iain Phillips and Lin Cui}, title = {Relays: Towards a Link Layer for Robust and Secure Fog Computing}, booktitle = {Proceedings of the 2018 Workshop on Theory and Practice for Integrated Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United Kingdom, July 27, 2018}, pages = {1--2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3229774.3229781}, doi = {10.1145/3229774.3229781}, timestamp = {Wed, 27 Apr 2022 08:14:27 +0200}, biburl = {https://dblp.org/rec/conf/podc/Scheideler18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/Tang18, author = {Xuan Tang}, title = {Best Practice for Developing Secure and Trusted Enterprise Storage {\&} Computing Products}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {142}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00038}, doi = {10.1109/SECDEV.2018.00038}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/Tang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/LuoHX18, author = {Shiyu Luo and Zhichao Hua and Yubin Xia}, title = {{TZ-KMS:} {A} Secure Key Management Service for Joint Cloud Computing with {ARM} TrustZone}, booktitle = {{IEEE} Symposium on Service-Oriented System Engineering, {SOSE} 2018, Bamberg, Germany, March 26-29, 2018}, pages = {180--185}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SOSE.2018.00030}, doi = {10.1109/SOSE.2018.00030}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/LuoHX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/ArifW0P18, author = {Muhammad Arif and Guojun Wang and Tian Wang and Tao Peng}, editor = {Guojun Wang and Jinjun Chen and Laurence T. Yang}, title = {SDN-Based Secure VANETs Communication with Fog Computing}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11342}, pages = {46--59}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05345-1\_4}, doi = {10.1007/978-3-030-05345-1\_4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/ArifW0P18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuPXWPW18, author = {Qin Liu and Shuyu Pei and Kang Xie and Jie Wu and Tao Peng and Guojun Wang}, title = {Achieving Secure and Effective Search Services in Cloud Computing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1386--1391}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00192}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00192}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuPXWPW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ucc/BuzachisV18, author = {Alina Buzachis and Massimo Villari}, editor = {Alan Sill and Josef Spillner}, title = {Basic Principles of Osmotic Computing: Secure and Dependable MicroElements (MELs) Orchestration Leveraging Blockchain Facilities}, booktitle = {2018 {IEEE/ACM} International Conference on Utility and Cloud Computing Companion, {UCC} Companion 2018, Zurich, Switzerland, December 17-20, 2018}, pages = {47--52}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/UCC-Companion.2018.00033}, doi = {10.1109/UCC-COMPANION.2018.00033}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ucc/BuzachisV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/ShaoZJ18, author = {Jiaye Shao and Yanqin Zhu and Qijin Ji}, editor = {Guojun Wang and Qi Han and Md. Zakirul Alam Bhuiyan and Xiaoxing Ma and Fr{\'{e}}d{\'{e}}ric Loulergue and Peng Li and Manuel Roveri and Lei Chen}, title = {Secure Online/Offline Multi-Authority Attribute-Based Encryption for Resource-Constrained Devices in Cloud Computing}, booktitle = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018}, pages = {642--649}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartWorld.2018.00129}, doi = {10.1109/SMARTWORLD.2018.00129}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/uic/ShaoZJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/ZhaoWLWWZC18, author = {Ruimin Zhao and Jin Wang and Kejie Lu and Jianping Wang and Xiumin Wang and Jingya Zhou and Chunming Cao}, editor = {Guojun Wang and Qi Han and Md. Zakirul Alam Bhuiyan and Xiaoxing Ma and Fr{\'{e}}d{\'{e}}ric Loulergue and Peng Li and Manuel Roveri and Lei Chen}, title = {Weakly Secure Coded Distributed Computing}, booktitle = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018}, pages = {603--610}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartWorld.2018.00124}, doi = {10.1109/SMARTWORLD.2018.00124}, timestamp = {Sat, 30 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/ZhaoWLWWZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/MeghanathanT18, author = {Natarajan Meghanathan and Michael Terrell}, editor = {Kevin Daimi}, title = {Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment}, booktitle = {Computer and Network Security Essentials}, pages = {475--490}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-58424-9\_27}, doi = {10.1007/978-3-319-58424-9\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/18/MeghanathanT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/18/SpanakiS18, author = {Polyxeni Spanaki and Nicolas Sklavos}, editor = {Kevin Daimi}, title = {Cloud Computing: Security Issues and Establishing Virtual Cloud Environment via Vagrant to Secure Cloud Hosts}, booktitle = {Computer and Network Security Essentials}, pages = {539--553}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-58424-9\_31}, doi = {10.1007/978-3-319-58424-9\_31}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/18/SpanakiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dasc/2018, title = {2018 {IEEE} 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2018, Athens, Greece, August 12-15, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8511011/proceeding}, isbn = {978-1-5386-7518-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dasc/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/desec/2018, title = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018, Kaohsiung, Taiwan, December 10-13, 2018}, publisher = {{IEEE}}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8614461/proceeding}, isbn = {978-1-5386-5790-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-02685, author = {Ehab Zaghloul and Kai Zhou and Jian Ren}, title = {{P-MOD:} Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing}, journal = {CoRR}, volume = {abs/1801.02685}, year = {2018}, url = {http://arxiv.org/abs/1801.02685}, eprinttype = {arXiv}, eprint = {1801.02685}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-02685.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-02640, author = {Rawad Bitar and Parimal Parag and Salim El Rouayheb}, title = {Minimizing Latency for Secure Coded Computing Using Secret Sharing via Staircase Codes}, journal = {CoRR}, volume = {abs/1802.02640}, year = {2018}, url = {http://arxiv.org/abs/1802.02640}, eprinttype = {arXiv}, eprint = {1802.02640}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-02640.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-08984, author = {Kalev Alpernas and Cormac Flanagan and Sadjad Fouladi and Leonid Ryzhyk and Mooly Sagiv and Thomas Schmitz and Keith Winstein}, title = {Secure Serverless Computing Using Dynamic Information Flow Control}, journal = {CoRR}, volume = {abs/1802.08984}, year = {2018}, url = {http://arxiv.org/abs/1802.08984}, eprinttype = {arXiv}, eprint = {1802.08984}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-08984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-03591, author = {Bingcong Li and Tianyi Chen and Georgios B. Giannakis}, title = {Secure Mobile Edge Computing in IoT via Collaborative Online Learning}, journal = {CoRR}, volume = {abs/1805.03591}, year = {2018}, url = {http://arxiv.org/abs/1805.03591}, eprinttype = {arXiv}, eprint = {1805.03591}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-03591.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-05528, author = {Zakaria Elmrabet and Hamid El Ghazi and Tayeb Sadiki and Hassan El Ghazi}, title = {A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing}, journal = {CoRR}, volume = {abs/1809.05528}, year = {2018}, url = {http://arxiv.org/abs/1809.05528}, eprinttype = {arXiv}, eprint = {1809.05528}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-05528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Sinha17, author = {Rohit Sinha}, title = {Secure Computing using Certified Software and Trusted Hardware}, school = {University of California, Berkeley, {USA}}, year = {2017}, url = {http://www.escholarship.org/uc/item/54r176n5}, timestamp = {Fri, 20 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Sinha17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYKZ17, author = {Xumin Huang and Rong Yu and Jiawen Kang and Yan Zhang}, title = {Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks}, journal = {{IEEE} Access}, volume = {5}, pages = {25408--25420}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2769878}, doi = {10.1109/ACCESS.2017.2769878}, timestamp = {Fri, 28 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYKZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangYW17, author = {Qinlong Huang and Yixian Yang and Licheng Wang}, title = {Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things}, journal = {{IEEE} Access}, volume = {5}, pages = {12941--12950}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2727054}, doi = {10.1109/ACCESS.2017.2727054}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/HuangYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RahmanHH17, author = {Mohamed Abdur Rahman and Elham Hassanain and M. Shamim Hossain}, title = {Towards a Secure Mobile Edge Computing Framework for Hajj}, journal = {{IEEE} Access}, volume = {5}, pages = {11768--11781}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2716782}, doi = {10.1109/ACCESS.2017.2716782}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/RahmanHH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RoyCDCKV17, author = {Sandip Roy and Santanu Chatterjee and Ashok Kumar Das and Samiran Chattopadhyay and Neeraj Kumar and Athanasios V. Vasilakos}, title = {On the Design of Provably Secure Lightweight Remote User Authentication Scheme for Mobile Cloud Computing Services}, journal = {{IEEE} Access}, volume = {5}, pages = {25808--25825}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2764913}, doi = {10.1109/ACCESS.2017.2764913}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RoyCDCKV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SoleymaniAZAVKG17, author = {Seyed Ahmad Soleymani and Abdul Hanan Abdullah and Mahdi Zareei and Mohammad Hossein Anisi and C{\'{e}}sar Vargas Rosales and Muhammad Khurram Khan and Shidrokh Goudarzi}, title = {A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing}, journal = {{IEEE} Access}, volume = {5}, pages = {15619--15629}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2733225}, doi = {10.1109/ACCESS.2017.2733225}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SoleymaniAZAVKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZahraAJWJMK17, author = {Samman Zahra and Masoom Alam and Qaisar Javaid and Abdul Wahid and Nadeem Javaid and Saif Ur Rehman Malik and Muhammad Khurram Khan}, title = {Fog Computing Over IoT: {A} Secure Deployment and Formal Verification}, journal = {{IEEE} Access}, volume = {5}, pages = {27132--27144}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2766180}, doi = {10.1109/ACCESS.2017.2766180}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZahraAJWJMK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/AminISSL17, author = {Rooh ul Amin and Irum Inayat and Basit Shahzad and Kashif Saleem and AiJun Li}, title = {An empirical study on acceptance of secure healthcare service in Malaysia, Pakistan, and Saudi Arabia: a mobile cloud computing perspective}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {72}, number = {5-6}, pages = {253--264}, year = {2017}, url = {https://doi.org/10.1007/s12243-016-0553-4}, doi = {10.1007/S12243-016-0553-4}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/AminISSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/JararwehATDS17, author = {Yaser Jararweh and Mahmoud Al{-}Ayyoub and Lo'ai Tawalbeh and Ala Darabseh and Houbing Song}, title = {Software-defined systems support for secure cloud computing based on data classification}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {72}, number = {5-6}, pages = {335--345}, year = {2017}, url = {https://doi.org/10.1007/s12243-016-0549-0}, doi = {10.1007/S12243-016-0549-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/JararwehATDS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiuWLPW17, author = {Qin Liu and Guojun Wang and Xuhui Liu and Tao Peng and Jie Wu}, title = {Achieving reliable and secure services in cloud computing environments}, journal = {Comput. Electr. Eng.}, volume = {59}, pages = {153--164}, year = {2017}, url = {https://doi.org/10.1016/j.compeleceng.2016.10.005}, doi = {10.1016/J.COMPELECENG.2016.10.005}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/LiuWLPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ArvindM17, author = {K. S. Arvind and R. Manimegalai}, title = {Secure data classification using superior naive classifier in agent based mobile cloud computing}, journal = {Clust. Comput.}, volume = {20}, number = {2}, pages = {1535--1542}, year = {2017}, url = {https://doi.org/10.1007/s10586-017-0797-4}, doi = {10.1007/S10586-017-0797-4}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ArvindM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/GaiQH17, author = {Keke Gai and Meikang Qiu and Houcine Hassan}, title = {Secure cyber incident analytics framework using Monte Carlo simulations for financial cybersecurity insurance in cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {7}, year = {2017}, url = {https://doi.org/10.1002/cpe.3856}, doi = {10.1002/CPE.3856}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/GaiQH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/NamasudraR17, author = {Suyel Namasudra and Pinki Roy}, title = {A new secure authentication scheme for cloud computing environment}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {20}, year = {2017}, url = {https://doi.org/10.1002/cpe.3864}, doi = {10.1002/CPE.3864}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/NamasudraR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/QinSWZXQ17, author = {Zhen Qin and Jianfei Sun and Abubaker Wahaballa and Wentao Zheng and Hu Xiong and Zhiguang Qin}, title = {A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing}, journal = {Comput. Stand. Interfaces}, volume = {54}, pages = {55--60}, year = {2017}, url = {https://doi.org/10.1016/j.csi.2016.11.012}, doi = {10.1016/J.CSI.2016.11.012}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/QinSWZXQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eis/SareenGS17, author = {Sanjay Sareen and Sunil Kumar Gupta and Sandeep K. Sood}, title = {An intelligent and secure system for predicting and preventing Zika virus outbreak using Fog computing}, journal = {Enterp. Inf. Syst.}, volume = {11}, number = {9}, pages = {1436--1456}, year = {2017}, url = {https://doi.org/10.1080/17517575.2016.1277558}, doi = {10.1080/17517575.2016.1277558}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eis/SareenGS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CastiglioneDSR17, author = {Arcangelo Castiglione and Paolo D'Arco and Alfredo De Santis and Rosario Russo}, title = {Secure group communication schemes for dynamic heterogeneous distributed computing}, journal = {Future Gener. Comput. Syst.}, volume = {74}, pages = {313--324}, year = {2017}, url = {https://doi.org/10.1016/j.future.2015.11.026}, doi = {10.1016/J.FUTURE.2015.11.026}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CastiglioneDSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/HuangYS17, author = {Qinlong Huang and Yixian Yang and Mansuo Shen}, title = {Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {72}, pages = {239--249}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.09.021}, doi = {10.1016/J.FUTURE.2016.09.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/HuangYS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/NamasudraRVAB17, author = {Suyel Namasudra and Pinki Roy and Pandi Vijayakumar and Sivaraman Audithan and Balamurugan Balusamy}, title = {Time efficient secure {DNA} based access control model for cloud computing environment}, journal = {Future Gener. Comput. Syst.}, volume = {73}, pages = {90--105}, year = {2017}, url = {https://doi.org/10.1016/j.future.2017.01.017}, doi = {10.1016/J.FUTURE.2017.01.017}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/NamasudraRVAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/OdeluDKHW17, author = {Vanga Odelu and Ashok Kumar Das and Saru Kumari and Xinyi Huang and Mohammad Wazid}, title = {Provably secure authenticated key agreement scheme for distributed mobile cloud computing services}, journal = {Future Gener. Comput. Syst.}, volume = {68}, pages = {74--88}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.09.009}, doi = {10.1016/J.FUTURE.2016.09.009}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/OdeluDKHW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/Rao17, author = {Y. Sreenivasa Rao}, title = {A secure and efficient Ciphertext-Policy Attribute-Based Signcryption for Personal Health Records sharing in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {67}, pages = {133--151}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.07.019}, doi = {10.1016/J.FUTURE.2016.07.019}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/Rao17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WuZCH17, author = {Libing Wu and Yubo Zhang and Kim{-}Kwang Raymond Choo and Debiao He}, title = {Efficient and secure identity-based encryption scheme with equality test in cloud computing}, journal = {Future Gener. Comput. Syst.}, volume = {73}, pages = {22--31}, year = {2017}, url = {https://doi.org/10.1016/j.future.2017.03.007}, doi = {10.1016/J.FUTURE.2017.03.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WuZCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnds/KimL17, author = {Hyun{-}Jin Kim and Im{-}Yeong Lee}, title = {A study on a secure single sign-on for user authentication information privacy in distributed computing environment}, journal = {Int. J. Commun. Networks Distributed Syst.}, volume = {19}, number = {1}, pages = {28--45}, year = {2017}, url = {https://doi.org/10.1504/IJCNDS.2017.10002332}, doi = {10.1504/IJCNDS.2017.10002332}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcnds/KimL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/LiuWYJL17, author = {Meng Liu and Xuan Wang and Chi Yang and Zoe Lin Jiang and Ye Li}, title = {An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing}, journal = {Int. J. Distributed Sens. Networks}, volume = {13}, number = {1}, year = {2017}, url = {https://doi.org/10.1177/1550147716686579}, doi = {10.1177/1550147716686579}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/LiuWYJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/MaLO17, author = {Chunguang Ma and Juyan Li and Weiping Ouyang}, title = {Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment}, journal = {Int. J. Found. Comput. Sci.}, volume = {28}, number = {6}, pages = {645--660}, year = {2017}, url = {https://doi.org/10.1142/S0129054117400111}, doi = {10.1142/S0129054117400111}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/MaLO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/TawalbehAJA17, author = {Lo'ai Ali Tawalbeh and Fadi Ababneh and Yaser Jararweh and Fahd M. Al{-}Dosari}, title = {Trust delegation-based secure mobile cloud computing framework}, journal = {Int. J. Inf. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {36--48}, year = {2017}, url = {https://doi.org/10.1504/IJICS.2017.10003598}, doi = {10.1504/IJICS.2017.10003598}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/TawalbehAJA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitwe/He17, author = {Yan He}, title = {Study on Secure Dynamic Covering Algorithm for E-Logistics Information in a Cloud Computing Platform}, journal = {Int. J. Inf. Technol. Web Eng.}, volume = {12}, number = {4}, pages = {42--55}, year = {2017}, url = {https://doi.org/10.4018/IJITWE.2017100103}, doi = {10.4018/IJITWE.2017100103}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitwe/He17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/BalusamyKAC17, author = {Balamurugan Balusamy and P. Venkata Krishna and G. S. Tamizh Arasi and Victor Chang}, title = {A Secured Access Control Technique for Cloud Computing Environment Using Attribute Based Hierarchical Structure and Token Granting System}, journal = {Int. J. Netw. Secur.}, volume = {19}, number = {4}, pages = {559--572}, year = {2017}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p559-572.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/BalusamyKAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwgs/WangCLKK17, author = {Jianfeng Wang and Xiaofeng Chen and Jin Li and Kamil Kluczniak and Miroslaw Kutylowski}, title = {TrDup: enhancing secure data deduplication with user traceability in cloud computing}, journal = {Int. J. Web Grid Serv.}, volume = {13}, number = {3}, pages = {270--289}, year = {2017}, url = {https://doi.org/10.1504/IJWGS.2017.10006054}, doi = {10.1504/IJWGS.2017.10006054}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwgs/WangCLKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiGQQZ17, author = {Yibin Li and Keke Gai and Longfei Qiu and Meikang Qiu and Hui Zhao}, title = {Intelligent cryptography approach for secure distributed big data storage in cloud computing}, journal = {Inf. Sci.}, volume = {387}, pages = {103--115}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.09.005}, doi = {10.1016/J.INS.2016.09.005}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiGQQZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/DongRZ17, author = {Min Dong and Yanli Ren and Xinpeng Zhang}, title = {Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {7}, pages = {3648--3663}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.07.019}, doi = {10.3837/TIIS.2017.07.019}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/DongRZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/YinQOL17, author = {Hui Yin and Zheng Qin and Lu Ou and Keqin Li}, title = {A query privacy-enhanced and secure search scheme over encrypted data in cloud computing}, journal = {J. Comput. Syst. Sci.}, volume = {90}, pages = {14--27}, year = {2017}, url = {https://doi.org/10.1016/j.jcss.2016.12.003}, doi = {10.1016/J.JCSS.2016.12.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/YinQOL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jgim/SekharRV17, author = {B. V. D. S. Sekhar and P. V. G. D. Prasad Reddy and G. P. Saradhi Varma}, title = {Performance of Secured and Robust Watermarking Using Evolutionary Computing Technique}, journal = {J. Glob. Inf. Manag.}, volume = {25}, number = {4}, pages = {61--79}, year = {2017}, url = {https://doi.org/10.4018/JGIM.2017100105}, doi = {10.4018/JGIM.2017100105}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jgim/SekharRV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/RathodR17, author = {Suresh B. Rathod and Vuyyuru Krishna Reddy}, title = {NDynamic Framework for Secure {VM} Migration over Cloud Computing}, journal = {J. Inf. Process. Syst.}, volume = {13}, number = {3}, pages = {476--490}, year = {2017}, url = {https://doi.org/10.3745/JIPS.01.0015}, doi = {10.3745/JIPS.01.0015}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jips/RathodR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/MondalM17, author = {Bhaskar Mondal and Tarni Mandal}, title = {A light weight secure image encryption scheme based on chaos {\&} {DNA} computing}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {29}, number = {4}, pages = {499--504}, year = {2017}, url = {https://doi.org/10.1016/j.jksuci.2016.02.003}, doi = {10.1016/J.JKSUCI.2016.02.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jksucis/MondalM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/HuCFW17, author = {Jin{-}Xin Hu and Chin{-}Ling Chen and Chun{-}Long Fan and Kun{-}hao Wang}, title = {An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing}, journal = {J. Sensors}, volume = {2017}, pages = {3734764:1--3734764:11}, year = {2017}, url = {https://doi.org/10.1155/2017/3734764}, doi = {10.1155/2017/3734764}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/HuCFW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/KimKP17, author = {Hyungjoo Kim and Jungho Kang and Jong Hyuk Park}, title = {A light-weight secure information transmission and device control scheme in integration of {CPS} and cloud computing}, journal = {Microprocess. Microsystems}, volume = {52}, pages = {416--426}, year = {2017}, url = {https://doi.org/10.1016/j.micpro.2016.08.001}, doi = {10.1016/J.MICPRO.2016.08.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/KimKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/StergiouP17, author = {Christos Stergiou and Kostas E. Psannis}, title = {Efficient and secure {BIG} data delivery in Cloud Computing}, journal = {Multim. Tools Appl.}, volume = {76}, number = {21}, pages = {22803--22822}, year = {2017}, url = {https://doi.org/10.1007/s11042-017-4590-4}, doi = {10.1007/S11042-017-4590-4}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/StergiouP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scpe/SharmaBBS17, author = {Kavita Sharma and Suman Bala and Himani Bansal and Gulshan Shrivastava}, title = {Introduction to the Special Issue on Secure Solutions for Network in Scalable Computing}, journal = {Scalable Comput. Pract. Exp.}, volume = {18}, number = {3}, pages = {iii--iv}, year = {2017}, url = {https://doi.org/10.12694/scpe.v18i3.1299}, doi = {10.12694/SCPE.V18I3.1299}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scpe/SharmaBBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FanWWLY17, author = {Kai Fan and Junxiong Wang and Xin Wang and Hui Li and Yintang Yang}, title = {A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing}, journal = {Sensors}, volume = {17}, number = {7}, pages = {1695}, year = {2017}, url = {https://doi.org/10.3390/s17071695}, doi = {10.3390/S17071695}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/FanWWLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/WuHYLA17, author = {Wei Wu and Shun Hu and Xu Yang and Joseph K. Liu and Man Ho Au}, title = {Towards secure and cost-effective fuzzy access control in mobile cloud computing}, journal = {Soft Comput.}, volume = {21}, number = {10}, pages = {2643--2649}, year = {2017}, url = {https://doi.org/10.1007/s00500-015-1964-2}, doi = {10.1007/S00500-015-1964-2}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/WuHYLA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/ZouWYSC17, author = {Qin Zou and Jianfeng Wang and Jun Ye and Jian Shen and Xiaofeng Chen}, title = {Efficient and secure encrypted image search in mobile cloud computing}, journal = {Soft Comput.}, volume = {21}, number = {11}, pages = {2959--2969}, year = {2017}, url = {https://doi.org/10.1007/s00500-016-2153-7}, doi = {10.1007/S00500-016-2153-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/ZouWYSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/LiuMWCHX17, author = {Jianghua Liu and Jinhua Ma and Wei Wu and Xiaofeng Chen and Xinyi Huang and Li Xu}, title = {Protecting Mobile Health Records in Cloud Computing: {A} Secure, Efficient, and Anonymous Design}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {16}, number = {2}, pages = {57:1--57:20}, year = {2017}, url = {https://doi.org/10.1145/2983625}, doi = {10.1145/2983625}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/LiuMWCHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/MathewCP17, author = {Jimson Mathew and Rajat Subhra Chakraborty and Dhiraj K. Pradhan}, title = {Guest Editorial: Special Issue on "Secure and Fault-Tolerant Embedded Computing"}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {16}, number = {4}, pages = {92:1--92:2}, year = {2017}, url = {https://doi.org/10.1145/3075563}, doi = {10.1145/3075563}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/MathewCP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhouAR17, author = {Kai Zhou and M. H. Afifi and Jian Ren}, title = {ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2518--2531}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2710941}, doi = {10.1109/TIFS.2017.2710941}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhouAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.