Search dblp for Publications

export results for "secure computing"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/access/BozkayaAras24,
  author       = {Elif Bozkaya{-}Aras},
  title        = {Blockchain-Based Secure Content Caching and Computation for Edge Computing},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {47619--47629},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3383474},
  doi          = {10.1109/ACCESS.2024.3383474},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/BozkayaAras24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HanSKCL24,
  author       = {Boyoung Han and
                  Hojune Shin and
                  Yeonghyeon Kim and
                  Jina Choi and
                  Younho Lee},
  title        = {HEaaN-NB: Non-Interactive Privacy-Preserving Naive Bayes Using {CKKS}
                  for Secure Outsourced Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {110762--110780},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3438161},
  doi          = {10.1109/ACCESS.2024.3438161},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HanSKCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NazihBLC24,
  author       = {Ossama Nazih and
                  Nabil Benamar and
                  Hanane Lamaazi and
                  Habiba Choaui},
  title        = {Toward Secure and Trustworthy Vehicular Fog Computing: {A} Survey},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {35154--35171},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3371488},
  doi          = {10.1109/ACCESS.2024.3371488},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NazihBLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SingamaneniMA24,
  author       = {Kranthi Kumar Singamaneni and
                  Ghulam Muhammad and
                  Zulfiqar Ali},
  title        = {A Novel Quantum Hash-Based Attribute-Based Encryption Approach for
                  Secure Data Integrity and Access Control in Mobile Edge Computing-Enabled
                  Customer Behavior Analysis},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {37378--37397},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3373648},
  doi          = {10.1109/ACCESS.2024.3373648},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SingamaneniMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/HuoLGWJ24,
  author       = {Yan Huo and
                  Qiyuan Liu and
                  Qinghe Gao and
                  Yingzhen Wu and
                  Tao Jing},
  title        = {Joint task offloading and resource allocation for secure OFDMA-based
                  mobile edge computing systems},
  journal      = {Ad Hoc Networks},
  volume       = {153},
  pages        = {103342},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2023.103342},
  doi          = {10.1016/J.ADHOC.2023.103342},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/HuoLGWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/MouraAL24,
  author       = {Douglas L. L. Moura and
                  Andr{\'{e}} L. L. de Aquino and
                  Antonio A. F. Loureiro},
  title        = {An edge computing and distributed ledger technology architecture for
                  secure and efficient transportation},
  journal      = {Ad Hoc Networks},
  volume       = {164},
  pages        = {103633},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103633},
  doi          = {10.1016/J.ADHOC.2024.103633},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/MouraAL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhaoZWWL24,
  author       = {Xu Zhao and
                  Tianhao Zhao and
                  Feiyu Wang and
                  Yichuan Wu and
                  Maozhen Li},
  title        = {SAC-based {UAV} mobile edge computing for energy minimization and
                  secure data transmission},
  journal      = {Ad Hoc Networks},
  volume       = {157},
  pages        = {103435},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.adhoc.2024.103435},
  doi          = {10.1016/J.ADHOC.2024.103435},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhaoZWWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/NawshinGUAS24,
  author       = {Faria Nawshin and
                  Radwa Gad and
                  Devrim Unal and
                  Abdulla Khalid Al{-}Ali and
                  Ponnuthurai N. Suganthan},
  title        = {Malware detection for mobile computing using secure and privacy-preserving
                  machine learning approaches: {A} comprehensive survey},
  journal      = {Comput. Electr. Eng.},
  volume       = {117},
  pages        = {109233},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.compeleceng.2024.109233},
  doi          = {10.1016/J.COMPELECENG.2024.109233},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/NawshinGUAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/SedjelmaciA24,
  author       = {Hichem Sedjelmaci and
                  Nirwan Ansari},
  title        = {On Cooperative Federated Defense to Secure Multiaccess Edge Computing},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {13},
  number       = {4},
  pages        = {24--31},
  year         = {2024},
  url          = {https://doi.org/10.1109/MCE.2022.3167527},
  doi          = {10.1109/MCE.2022.3167527},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/SedjelmaciA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/AlzahraniK24,
  author       = {Abdulrahman Alzahrani and
                  Rafiq Ahmad Khan},
  title        = {Secure software design evaluation and decision making model for ubiquitous
                  computing: {A} two-stage ANN-Fuzzy {AHP} approach},
  journal      = {Comput. Hum. Behav.},
  volume       = {153},
  pages        = {108109},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.chb.2023.108109},
  doi          = {10.1016/J.CHB.2023.108109},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chb/AlzahraniK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/LiuWLYZ24,
  author       = {Jiasen Liu and
                  Xu An Wang and
                  Guofeng Li and
                  Dan Yu and
                  Jindan Zhang},
  title        = {Improved secure {PCA} and {LDA} algorithms for intelligent computing
                  in IoT-to-cloud setting},
  journal      = {Comput. Intell.},
  volume       = {40},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1111/coin.12613},
  doi          = {10.1111/COIN.12613},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/LiuWLYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AgrawalSS24,
  author       = {Ruchi Agrawal and
                  Saurabh Singhal and
                  Ashish Sharma},
  title        = {Blockchain and fog computing model for secure data access control
                  mechanisms for distributed data storage and authentication using hybrid
                  encryption algorithm},
  journal      = {Clust. Comput.},
  volume       = {27},
  number       = {6},
  pages        = {8015--8030},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10586-024-04411-9},
  doi          = {10.1007/S10586-024-04411-9},
  timestamp    = {Fri, 13 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/AgrawalSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AkbarWMB24,
  author       = {Mohd Akbar and
                  Mohammed Mujtaba Waseem and
                  Syeda Husna Mehanoor and
                  Praveen Barmavatu},
  title        = {Blockchain-based cyber-security trust model with multi-risk protection
                  scheme for secure data transmission in cloud computing},
  journal      = {Clust. Comput.},
  volume       = {27},
  number       = {7},
  pages        = {9091--9105},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10586-024-04481-9},
  doi          = {10.1007/S10586-024-04481-9},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/AkbarWMB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/MiaoWWGHR24,
  author       = {Junfeng Miao and
                  Zhaoshun Wang and
                  Mei Wang and
                  Sahil Garg and
                  M. Shamim Hossain and
                  Joel J. P. C. Rodrigues},
  title        = {Secure and efficient communication approaches for Industry 5.0 in
                  edge computing},
  journal      = {Comput. Networks},
  volume       = {242},
  pages        = {110244},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110244},
  doi          = {10.1016/J.COMNET.2024.110244},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/MiaoWWGHR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/PeiYDLH24,
  author       = {Hongmei Pei and
                  Peng Yang and
                  Miao Du and
                  Zengyu Liang and
                  Zhongjian Hu},
  title        = {Blockchain-assisted Verifiable Secure Multi-Party Data Computing},
  journal      = {Comput. Networks},
  volume       = {253},
  pages        = {110712},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110712},
  doi          = {10.1016/J.COMNET.2024.110712},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/PeiYDLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/XiongXWXS24,
  author       = {Runqun Xiong and
                  Qing Xiao and
                  Zhoujie Wang and
                  Zhuqing Xu and
                  Feng Shan},
  title        = {Leveraging lightweight blockchain for secure collaborative computing
                  in {UAV} Ad-Hoc Networks},
  journal      = {Comput. Networks},
  volume       = {251},
  pages        = {110612},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.comnet.2024.110612},
  doi          = {10.1016/J.COMNET.2024.110612},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/XiongXWXS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/BojjaganiBKSB24,
  author       = {Sriramulu Bojjagani and
                  D. R. Denslin Brabin and
                  Kalai Kumar and
                  Neeraj Kumar Sharma and
                  Umamaheswararao Batta},
  title        = {Secure privacy-enhanced fast authentication and key management for
                  IoMT-enabled smart healthcare systems},
  journal      = {Computing},
  volume       = {106},
  number       = {7},
  pages        = {2427--2458},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00607-024-01291-0},
  doi          = {10.1007/S00607-024-01291-0},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/BojjaganiBKSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HuoZQWZ24,
  author       = {Yachao Huo and
                  Zongqu Zhao and
                  Panke Qin and
                  Shujing Wang and
                  Chengfu Zheng},
  title        = {Post-quantum secure two-party computing protocols against malicious
                  adversaries},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {4},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.7923},
  doi          = {10.1002/CPE.7923},
  timestamp    = {Mon, 11 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/HuoZQWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/SreeHT24,
  author       = {Thankaraja Raja Sree and
                  R. Harish and
                  Veni Thangaraj},
  title        = {FogSec: {A} secure and effective mutual authentication scheme for
                  fog computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {36},
  number       = {12},
  year         = {2024},
  url          = {https://doi.org/10.1002/cpe.8054},
  doi          = {10.1002/CPE.8054},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/SreeHT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/GuanZWL24,
  author       = {Shaopeng Guan and
                  Conghui Zhang and
                  Yilin Wang and
                  Wenqing Liu},
  title        = {Hadoop-based secure storage solution for big data in cloud computing
                  environment},
  journal      = {Digit. Commun. Networks},
  volume       = {10},
  number       = {1},
  pages        = {227--236},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.dcan.2023.01.014},
  doi          = {10.1016/J.DCAN.2023.01.014},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/GuanZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esi/KaurMLSDS24,
  author       = {Navjeet Kaur and
                  Ayush Mittal and
                  Umesh Kumar Lilhore and
                  Sarita Simaiya and
                  Surjeet Dalal and
                  Yogesh Kumar Sharma},
  title        = {An adaptive mobility-aware secure handover and scheduling protocol
                  for Earth Observation {(EO)} communication using fog computing},
  journal      = {Earth Sci. Informatics},
  volume       = {17},
  number       = {3},
  pages        = {2429--2446},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12145-024-01291-w},
  doi          = {10.1007/S12145-024-01291-W},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esi/KaurMLSDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/esi/MMRVD24,
  author       = {Ajitesh M and
                  Deekshith M and
                  Arun Amaithi Rajan and
                  Vetriselvi Vetrian and
                  Hemanth D},
  title        = {EdgeShield: Attack resistant secure and privacy-aware remote sensing
                  image retrieval system for military and geological applications using
                  edge computing},
  journal      = {Earth Sci. Informatics},
  volume       = {17},
  number       = {3},
  pages        = {2275--2302},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12145-024-01256-z},
  doi          = {10.1007/S12145-024-01256-Z},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/esi/MMRVD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/CuiSLZZC24,
  author       = {Zhihua Cui and
                  Zhenyu Shi and
                  Qi Li and
                  Tianhao Zhao and
                  Wensheng Zhang and
                  Jinjun Chen},
  title        = {Cooperative interference to achieve interval many-objective evolutionary
                  algorithm for association privacy secure computing migration},
  journal      = {Expert Syst. Appl.},
  volume       = {255},
  pages        = {124662},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2024.124662},
  doi          = {10.1016/J.ESWA.2024.124662},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eswa/CuiSLZZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ShrutiRS24,
  author       = {Shruti and
                  Shalli Rani and
                  Gautam Srivastava},
  title        = {Secure hierarchical fog computing-based architecture for industry
                  5.0 using an attribute-based encryption scheme},
  journal      = {Expert Syst. Appl.},
  volume       = {235},
  pages        = {121180},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.eswa.2023.121180},
  doi          = {10.1016/J.ESWA.2023.121180},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/ShrutiRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/JanGATAN24,
  author       = {Saeed Ullah Jan and
                  Anwar Ghani and
                  Abdulrahman Alzahrani and
                  Muhammad Usman Tariq and
                  Fahad Algarni and
                  Syed Husnain Abbas Naqvi},
  title        = {{SKALP:} Secure key agreement and lightweight protocol for dew-assisted
                  IoT enabled edge computing},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {35},
  number       = {9},
  year         = {2024},
  url          = {https://doi.org/10.1002/ett.5035},
  doi          = {10.1002/ETT.5035},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/JanGATAN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Krishnan24,
  author       = {Sathish Chander Krishnan},
  title        = {AI-HybridChain: Picturized authentication and {DRL} based access control
                  method with secure two fold revocation for ensuring cloud computing
                  security},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {160},
  pages        = {389--405},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2024.04.054},
  doi          = {10.1016/J.FUTURE.2024.04.054},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/Krishnan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhangHLL24,
  author       = {Shiwen Zhang and
                  Jiayi He and
                  Wei Liang and
                  Keqin Li},
  title        = {{MMDS:} {A} secure and verifiable multimedia data search scheme for
                  cloud-assisted edge computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {151},
  pages        = {32--44},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2023.09.023},
  doi          = {10.1016/J.FUTURE.2023.09.023},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhangHLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/grid/TianLDZW24,
  author       = {Hao Tian and
                  Ruiheng Li and
                  Yi Di and
                  Qiankun Zuo and
                  Jinpeng Wang},
  title        = {Employing {RNN} and Petri Nets to Secure Edge Computing Threats in
                  Smart Cities},
  journal      = {J. Grid Comput.},
  volume       = {22},
  number       = {1},
  pages        = {32},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10723-023-09733-3},
  doi          = {10.1007/S10723-023-09733-3},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/grid/TianLDZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/WuLQWL24,
  author       = {Mengru Wu and
                  Kexin Li and
                  Li Ping Qian and
                  Yuan Wu and
                  Inkyu Lee},
  title        = {Secure Computation Offloading and Service Caching in Mobile Edge Computing
                  Networks},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {28},
  number       = {2},
  pages        = {432--436},
  year         = {2024},
  url          = {https://doi.org/10.1109/LCOMM.2023.3347218},
  doi          = {10.1109/LCOMM.2023.3347218},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/WuLQWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-cps/ZaccagninoCOPM24,
  author       = {Rocco Zaccagnino and
                  Arcangelo Castiglione and
                  Marek R. Ogiela and
                  Florin Pop and
                  Weizhi Meng},
  title        = {Guest Editorial: IoT-based secure health monitoring and tracking through
                  estimated computing},
  journal      = {{IET} Cyper-Phys. Syst.: Theory {\&} Appl.},
  volume       = {9},
  number       = {2},
  pages        = {99--101},
  year         = {2024},
  url          = {https://doi.org/10.1049/cps2.12094},
  doi          = {10.1049/CPS2.12094},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-cps/ZaccagninoCOPM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/QianGGLHX24,
  author       = {Jin Qian and
                  Xinmei Gao and
                  Qinghe Gao and
                  Hui Li and
                  Yan Huo and
                  Xiaoshuang Xing},
  title        = {An enhanced energy efficiency scheme for secure computing in {UAV-MEC}
                  networks},
  journal      = {Int. J. Sens. Networks},
  volume       = {44},
  number       = {1},
  pages        = {23--35},
  year         = {2024},
  url          = {https://doi.org/10.1504/IJSNET.2024.136336},
  doi          = {10.1504/IJSNET.2024.136336},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijsnet/QianGGLHX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/BounairaAS24,
  author       = {Soumaya Bounaira and
                  Ahmed Alioua and
                  Ismahane Souici},
  title        = {Blockchain-enabled trust management for secure content caching in
                  mobile edge computing using deep reinforcement learning},
  journal      = {Internet Things},
  volume       = {25},
  pages        = {101081},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.iot.2024.101081},
  doi          = {10.1016/J.IOT.2024.101081},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/BounairaAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/RazaqueKYAAA24,
  author       = {Abdul Razaque and
                  Meenhoon Khan and
                  Joon Yoo and
                  Aziz Alotaibi and
                  Majid Alshammari and
                  Muder Almiani},
  title        = {Blockchain-enabled heterogeneous 6G supported secure vehicular management
                  system over cloud edge computing},
  journal      = {Internet Things},
  volume       = {25},
  pages        = {101115},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.iot.2024.101115},
  doi          = {10.1016/J.IOT.2024.101115},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/RazaqueKYAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/BaiFZLY24,
  author       = {Yuhan Bai and
                  Kai Fan and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {{CR-FH-CPABE:} Secure File Hierarchy Attribute-Based Encryption Scheme
                  Supporting User Collusion Resistance in Cloud Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {10},
  pages        = {17727--17739},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3358745},
  doi          = {10.1109/JIOT.2024.3358745},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/BaiFZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CobblahXGXKO24,
  author       = {Christian Nii Aflah Cobblah and
                  Qi Xia and
                  Jianbin Gao and
                  Hu Xia and
                  Goodlet Akwasi Kusi and
                  Isaac Amankona Obiri},
  title        = {A Secure and Lightweight NDN-Based Vehicular Network Using Edge Computing
                  and Certificateless Signcryption},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {16},
  pages        = {27043--27057},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3399031},
  doi          = {10.1109/JIOT.2024.3399031},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/CobblahXGXKO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CuiY24,
  author       = {Hui Cui and
                  Xun Yi},
  title        = {Secure Internet of Things in Cloud Computing via Puncturable Attribute-Based
                  Encryption With User Revocation},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {3662--3670},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3297997},
  doi          = {10.1109/JIOT.2023.3297997},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/CuiY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LeeRW24,
  author       = {Hakjun Lee and
                  Jihyeon Ryu and
                  Dongho Won},
  title        = {Secure and Anonymous Authentication Scheme for Mobile Edge Computing
                  Environments},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {4},
  pages        = {5798--5815},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3308568},
  doi          = {10.1109/JIOT.2023.3308568},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LeeRW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuWPLXCXL24,
  author       = {Xin Liu and
                  Ruxue Wang and
                  Lu Peng and
                  Dan Luo and
                  Gang Xu and
                  Xiu{-}Bo Chen and
                  Neal Xiong and
                  Xiaomeng Liu},
  title        = {Secure Computing Protocols for Internet of Things Data Fusion Based
                  on Set Intersection and Union Against Malicious Enemies},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {14},
  pages        = {24918--24932},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3385476},
  doi          = {10.1109/JIOT.2024.3385476},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuWPLXCXL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuZZLL24,
  author       = {Mengying Xu and
                  Yunxiao Zu and
                  Jie Zhou and
                  Yang Liu and
                  Chaoqun Li},
  title        = {Energy-Efficient Secure QoS Routing Algorithm Based on Elite Niche
                  Clone Evolutionary Computing for {WSN}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {14395--14415},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3342091},
  doi          = {10.1109/JIOT.2023.3342091},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/XuZZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangLWLLW24,
  author       = {Shaobo Zhang and
                  Qi Liu and
                  Tian Wang and
                  Wei Liang and
                  Kuan{-}Ching Li and
                  Guojun Wang},
  title        = {{FSAIR:} Fine-Grained Secure Approximate Image Retrieval for Mobile
                  Cloud Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {13},
  pages        = {23297--23308},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2024.3384458},
  doi          = {10.1109/JIOT.2024.3384458},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangLWLLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangWWPWL24,
  author       = {Linru Zhang and
                  Xiangning Wang and
                  Jiabo Wang and
                  Rachael Pung and
                  Huaxiong Wang and
                  Kwok{-}Yan Lam},
  title        = {An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture
                  for IoMT Data Protection With its Application to Pandemic Modeling},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {9},
  pages        = {15272--15284},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3348122},
  doi          = {10.1109/JIOT.2023.3348122},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangWWPWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangZY24,
  author       = {Zufan Zhang and
                  Kewen Zeng and
                  Yinxue Yi},
  title        = {Blockchain-Empowered Secure Aerial Edge Computing for AIoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {1},
  pages        = {84--94},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3294222},
  doi          = {10.1109/JIOT.2023.3294222},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/GhadiSMSOH24,
  author       = {Yazeed Yasin Ghadi and
                  Syed Faisal Abbas Shah and
                  Tehseen Mazhar and
                  Tariq Shahzad and
                  Khmaies Ouahada and
                  Habib Hamam},
  title        = {Enhancing patient healthcare with mobile edge computing and 5G: challenges
                  and solutions for secure online health tools},
  journal      = {J. Cloud Comput.},
  volume       = {13},
  number       = {1},
  pages        = {93},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13677-024-00654-4},
  doi          = {10.1186/S13677-024-00654-4},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/GhadiSMSOH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/MiaoXZZLWM24,
  author       = {Weiwei Miao and
                  Yuanyi Xia and
                  Rui Zhang and
                  Xinjian Zhao and
                  Qianmu Li and
                  Tao Wang and
                  Shunmei Meng},
  title        = {A secure data interaction method based on edge computing},
  journal      = {J. Cloud Comput.},
  volume       = {13},
  number       = {1},
  pages        = {61},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13677-024-00617-9},
  doi          = {10.1186/S13677-024-00617-9},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/MiaoXZZLWM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/ThangarajS24,
  author       = {Veni Thangaraj and
                  Thankaraja Raja Sree},
  title        = {{MSCO:} Mobility-aware Secure Computation Offloading in blockchain-enabled
                  Fog computing environments},
  journal      = {J. Cloud Comput.},
  volume       = {13},
  number       = {1},
  pages        = {88},
  year         = {2024},
  url          = {https://doi.org/10.1186/s13677-024-00599-8},
  doi          = {10.1186/S13677-024-00599-8},
  timestamp    = {Tue, 16 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/ThangarajS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/AbdoKY24,
  author       = {A. Abdo and
                  Taghreed S. Karamany and
                  Ahmed Yakoub},
  title        = {A hybrid approach to secure and compress data streams in cloud computing
                  environment},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {36},
  number       = {3},
  pages        = {101999},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jksuci.2024.101999},
  doi          = {10.1016/J.JKSUCI.2024.101999},
  timestamp    = {Tue, 09 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/AbdoKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SinghSMH24,
  author       = {Gursharan Singh and
                  Parminder Singh and
                  Anas Motii and
                  Mustapha Hedabou},
  title        = {A secure and lightweight container migration technique in cloud computing},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {36},
  number       = {1},
  pages        = {101887},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101887},
  doi          = {10.1016/J.JKSUCI.2023.101887},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jksucis/SinghSMH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/PremkumarS24,
  author       = {N. Premkumar and
                  R. Santhosh},
  title        = {Pelican optimization algorithm with blockchain for secure load balancing
                  in fog computing},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {18},
  pages        = {53417--53439},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-17632-8},
  doi          = {10.1007/S11042-023-17632-8},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/PremkumarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ReddyRKK24,
  author       = {M. Indrasena Reddy and
                  P. Venkateswara Rao and
                  Talluri Sunil Kumar and
                  Srinivasa Reddy K},
  title        = {Encryption with access policy and cloud data selection for secure
                  and energy-efficient cloud computing},
  journal      = {Multim. Tools Appl.},
  volume       = {83},
  number       = {6},
  pages        = {15649--15675},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11042-023-16082-6},
  doi          = {10.1007/S11042-023-16082-6},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/ReddyRKK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nca/ChakrabortyOAS24,
  author       = {Chinmay Chakraborty and
                  Soufiene Ben Othman and
                  Faris A. Almalki and
                  Hedi Sakli},
  title        = {{FC-SEEDA:} fog computing-based secure and energy efficient data aggregation
                  scheme for Internet of healthcare Things},
  journal      = {Neural Comput. Appl.},
  volume       = {36},
  number       = {1},
  pages        = {241--257},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00521-023-08270-0},
  doi          = {10.1007/S00521-023-08270-0},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/nca/ChakrabortyOAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/SedjelmaciA24,
  author       = {Hichem Sedjelmaci and
                  Nirwan Ansari},
  title        = {Zero Trust Architecture Empowered Attack Detection Framework to Secure
                  6G Edge Computing},
  journal      = {{IEEE} Netw.},
  volume       = {38},
  number       = {1},
  pages        = {196--202},
  year         = {2024},
  url          = {https://doi.org/10.1109/MNET.131.2200513},
  doi          = {10.1109/MNET.131.2200513},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/SedjelmaciA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/CicconettiCP24,
  author       = {Claudio Cicconetti and
                  Marco Conti and
                  Andrea Passarella},
  title        = {Analysis of micro- vs. macro-flows management in QKD-secured edge
                  computing},
  journal      = {Pervasive Mob. Comput.},
  volume       = {102},
  pages        = {101937},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.pmcj.2024.101937},
  doi          = {10.1016/J.PMCJ.2024.101937},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/CicconettiCP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SangeethapriyaAR24,
  author       = {J. Sangeethapriya and
                  Michael Arock and
                  U. Srinivasulu Reddy},
  title        = {Secured Frank Wolfe learning and Dirichlet Gaussian Vicinity based
                  authentication for IoT edge computing},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {17},
  number       = {4},
  pages        = {1885--1897},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12083-024-01667-1},
  doi          = {10.1007/S12083-024-01667-1},
  timestamp    = {Mon, 24 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SangeethapriyaAR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/PalanivelM24,
  author       = {R. Palanivel and
                  P. Muthulakshmi},
  title        = {Error mitigation using quantum neural {Q} network in secure qutrit
                  distribution on Cleve's protocol on quantum computing},
  journal      = {Quantum Inf. Process.},
  volume       = {23},
  number       = {4},
  pages        = {147},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11128-024-04342-9},
  doi          = {10.1007/S11128-024-04342-9},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/PalanivelM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/RahmaniPB24,
  author       = {Zeinab Rahmani and
                  Armando Nolasco Pinto and
                  Lu{\'{\i}}s Soares Barbosa},
  title        = {Secure two-party computation via measurement-based quantum computing},
  journal      = {Quantum Inf. Process.},
  volume       = {23},
  number       = {6},
  pages        = {221},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11128-024-04433-7},
  doi          = {10.1007/S11128-024-04433-7},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/RahmaniPB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KarnatakMTWSD24,
  author       = {Vijay Karnatak and
                  Amit Kumar Mishra and
                  Neha Tripathi and
                  Mohammad Wazid and
                  Jaskaran Singh and
                  Ashok Kumar Das},
  title        = {A secure signature-based access control and key management scheme
                  for fog computing-based IoT-enabled big data applications},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.353},
  doi          = {10.1002/SPY2.353},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KarnatakMTWSD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/MiaoZ24,
  author       = {Zhifeng Miao and
                  Chunping Zhao},
  title        = {Secure Encrypted Transmission of Network Data in Cloud Computing Technology
                  Environment},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {25},
  number       = {4},
  pages        = {2671--2678},
  year         = {2024},
  url          = {https://doi.org/10.12694/scpe.v25i4.2980},
  doi          = {10.12694/SCPE.V25I4.2980},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scpe/MiaoZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlviASAAA24,
  author       = {Ahmad Naseem Alvi and
                  Bakhtiar Ali and
                  Mohamed Saad Saleh and
                  Mohammed Alkhathami and
                  Deafallah Alsadie and
                  Bushra Alghamdi},
  title        = {Secure Computing for Fog-Enabled Industrial IoT},
  journal      = {Sensors},
  volume       = {24},
  number       = {7},
  pages        = {2098},
  year         = {2024},
  url          = {https://doi.org/10.3390/s24072098},
  doi          = {10.3390/S24072098},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AlviASAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/AhmedKS24,
  author       = {Feroz Ahmed and
                  Sumit Kumar and
                  Pradeep Kumar Singh},
  title        = {Variable Neighborhood Search Based Human Learning Optimization Algorithm
                  for Secure Data Analysis and Computing},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {5},
  pages        = {557},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-024-02883-5},
  doi          = {10.1007/S42979-024-02883-5},
  timestamp    = {Fri, 28 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/AhmedKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/ET24,
  author       = {Geetha Rani E and
                  Chetana Tukkoji},
  title        = {Secure Data Storage in Cloud Computing Using Code Based McEliece and
                  {NTRU} Cryptosystems},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {4},
  pages        = {396},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-024-02736-1},
  doi          = {10.1007/S42979-024-02736-1},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/ET24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/KodadaDK24,
  author       = {Basappa B. Kodada and
                  Demian Antony D'Mello and
                  D. K. Santhosh Kumar},
  title        = {Finite State Automata Based Cryptosystem for Secure Data Sharing and
                  De-duplication in Cloud Computing},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {6},
  pages        = {774},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-024-03101-y},
  doi          = {10.1007/S42979-024-03101-Y},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/KodadaDK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/MondalC24,
  author       = {Avijit Mondal and
                  Pinaki Sankar Chatterjee},
  title        = {CloudSec: {A} Lightweight and Agile Approach to Secure Medical Image
                  Transmission in the Cloud Computing Environment},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {2},
  pages        = {237},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-023-02539-w},
  doi          = {10.1007/S42979-023-02539-W},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sncs/MondalC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/PuthalMM24,
  author       = {Deepak Puthal and
                  Amit Kumar Mishra and
                  Sambit Kumar Mishra},
  title        = {Special issue on collaborative edge computing for secure and scalable
                  Internet of Things},
  journal      = {Softw. Pract. Exp.},
  volume       = {54},
  number       = {7},
  pages        = {1215--1216},
  year         = {2024},
  url          = {https://doi.org/10.1002/spe.3337},
  doi          = {10.1002/SPE.3337},
  timestamp    = {Wed, 19 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/PuthalMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiZSCYL24,
  author       = {Shiyu Li and
                  Yuan Zhang and
                  Yaqing Song and
                  Nan Cheng and
                  Kan Yang and
                  Hongwei Li},
  title        = {Blockchain-Based Portable Authenticated Data Transmission for Mobile
                  Edge Computing: {A} Universally Composable Secure Solution},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {4},
  pages        = {1114--1125},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2024.3355759},
  doi          = {10.1109/TC.2024.3355759},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LiZSCYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LvCCSL24,
  author       = {Zhihan Lv and
                  Dongliang Chen and
                  Bin Cao and
                  Houbing Song and
                  Haibin Lv},
  title        = {Secure Deep Learning in Defense in Deep-Learning-as-a-Service Computing
                  Systems in Digital Twins},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {3},
  pages        = {656--668},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2021.3077687},
  doi          = {10.1109/TC.2021.3077687},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LvCCSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/YelluCY24,
  author       = {Pruthvy Yellu and
                  Nishanth Goud Chennagouni and
                  Qiaoyan Yu},
  title        = {{INEAD:} Intermediate Node Evaluation-Based Attack Detection for Secure
                  Approximate Computing Systems},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {43},
  number       = {3},
  pages        = {716--727},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCAD.2023.3328826},
  doi          = {10.1109/TCAD.2023.3328826},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcad/YelluCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ConsulBG24,
  author       = {Prakhar Consul and
                  Ishan Budhiraja and
                  Deepak Garg},
  title        = {A Hybrid Secure Resource Allocation and Trajectory Optimization Approach
                  for Mobile Edge Computing Using Federated Learning Based on {WEB}
                  3.0},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {70},
  number       = {1},
  pages        = {1167--1179},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCE.2023.3339853},
  doi          = {10.1109/TCE.2023.3339853},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/ConsulBG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ZhengCWZNA24,
  author       = {Tong{-}Xing Zheng and
                  Xin Chen and
                  Yating Wen and
                  Ning Zhang and
                  Derrick Wing Kwan Ng and
                  Naofal Al{-}Dhahir},
  title        = {Secure Offloading in NOMA-Enabled Multi-Access Edge Computing Networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {72},
  number       = {4},
  pages        = {2152--2165},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCOMM.2023.3342242},
  doi          = {10.1109/TCOMM.2023.3342242},
  timestamp    = {Thu, 08 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/ZhengCWZNA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/DuttaPD24,
  author       = {Subhranil Dutta and
                  Tapas Pal and
                  Ratna Dutta},
  title        = {Reinforcing privacy in cloud computing via adaptively secure non-zero
                  inner product encryption and anonymous identity-based revocation in
                  unbounded setting},
  journal      = {Theor. Comput. Sci.},
  volume       = {995},
  pages        = {114502},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.tcs.2024.114502},
  doi          = {10.1016/J.TCS.2024.114502},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/DuttaPD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShadabZGAL24,
  author       = {Rakin Muhammad Shadab and
                  Yu Zou and
                  Sanjay Gandham and
                  Amro Awad and
                  Mingjie Lin},
  title        = {A Secure Computing System With Hardware-Efficient Lazy Bonsai Merkle
                  Tree for FPGA-Attached Embedded Memory},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {3262--3279},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3324935},
  doi          = {10.1109/TDSC.2023.3324935},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShadabZGAL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/WuLLVGA24,
  author       = {Fan Wu and
                  Xiong Li and
                  Jingwei Li and
                  Pandi Vijayakumar and
                  Brij B. Gupta and
                  Varsha Arya},
  title        = {{HSADR:} {A} New Highly Secure Aggregation and Dropout-Resilient Federated
                  Learning Scheme for Radio Access Networks With Edge Computing Systems},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {8},
  number       = {3},
  pages        = {1141--1155},
  year         = {2024},
  url          = {https://doi.org/10.1109/TGCN.2024.3441532},
  doi          = {10.1109/TGCN.2024.3441532},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgcn/WuLLVGA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuWYMCZL24,
  author       = {Zhusen Liu and
                  Weizheng Wang and
                  Yutong Ye and
                  Nan Min and
                  Zhenfu Cao and
                  Lu Zhou and
                  Zhe Liu},
  title        = {Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party
                  Computation Scheme in Mobile Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {7019--7032},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3428410},
  doi          = {10.1109/TIFS.2024.3428410},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuWYMCZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangZWGFL24,
  author       = {Na Wang and
                  Wen Zhou and
                  Jingjing Wang and
                  Yifan Guo and
                  Junsong Fu and
                  Jianwei Liu},
  title        = {Secure and Efficient Similarity Retrieval in Cloud Computing Based
                  on Homomorphic Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2454--2469},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3350909},
  doi          = {10.1109/TIFS.2024.3350909},
  timestamp    = {Sat, 27 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangZWGFL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuZL24,
  author       = {Jiahui Wu and
                  Weizhe Zhang and
                  Fucai Luo},
  title        = {On the Security of "LSFL: {A} Lightweight and Secure Federated Learning
                  Scheme for Edge Computing"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3481--3482},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3331274},
  doi          = {10.1109/TIFS.2023.3331274},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZWZ24,
  author       = {Rui Zhang and
                  Lei Zhang and
                  Qian Wu and
                  Jianying Zhou},
  title        = {Secure Channel Establishment Scheme for Task Delivery in Vehicular
                  Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {2865--2880},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3356809},
  doi          = {10.1109/TIFS.2024.3356809},
  timestamp    = {Tue, 13 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhengZLZGWSL24,
  author       = {Yandong Zheng and
                  Hui Zhu and
                  Rongxing Lu and
                  Songnian Zhang and
                  Yunguo Guan and
                  Fengwei Wang and
                  Jun Shao and
                  Hui Li},
  title        = {Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced
                  Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {6237--6251},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3413630},
  doi          = {10.1109/TIFS.2024.3413630},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhengZLZGWSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/XuXCCLA24,
  author       = {Jianpeng Xu and
                  Aoshuo Xu and
                  Liangyu Chen and
                  Yali Chen and
                  Xiaolin Liang and
                  Bo Ai},
  title        = {Deep Reinforcement Learning for RIS-Aided Secure Mobile Edge Computing
                  in Industrial Internet of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {2},
  pages        = {2455--2464},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3292968},
  doi          = {10.1109/TII.2023.3292968},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/XuXCCLA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/JuCCLPMDG24,
  author       = {Ying Ju and
                  Zhiwei Cao and
                  Yuchao Chen and
                  Lei Liu and
                  Qingqi Pei and
                  Shahid Mumtaz and
                  Mianxiong Dong and
                  Mohsen Guizani},
  title        = {NOMA-Assisted Secure Offloading for Vehicular Edge Computing Networks
                  With Asynchronous Deep Reinforcement Learning},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {3},
  pages        = {2627--2640},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2023.3320861},
  doi          = {10.1109/TITS.2023.3320861},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/JuCCLPMDG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/SaleemLMTAD24,
  author       = {Muhammad Asad Saleem and
                  Xiong Li and
                  Khalid Mahmood and
                  Tayyaba Tariq and
                  Mohammed J. F. Alenazi and
                  Ashok Kumar Das},
  title        = {Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing
                  Environment},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {25},
  number       = {9},
  pages        = {12528--12537},
  year         = {2024},
  url          = {https://doi.org/10.1109/TITS.2024.3371464},
  doi          = {10.1109/TITS.2024.3371464},
  timestamp    = {Fri, 20 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/SaleemLMTAD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/XiaZGSHL24,
  author       = {Zhuoqun Xia and
                  Lingxuan Zeng and
                  Ke Gu and
                  Chao Su and
                  Hangyu Hu and
                  Kejun Long},
  title        = {Secure and Lightweight Vehicular Privacy Preservation Scheme Under
                  Fog Computing-Based IoVs},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {9},
  number       = {2},
  pages        = {4115--4129},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIV.2023.3303312},
  doi          = {10.1109/TIV.2023.3303312},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiv/XiaZGSHL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/AlavizadehEMS24,
  author       = {Alavieh Sadat Alavizadeh and
                  Seyed Hossein Erfani and
                  Meghdad Mirabi and
                  Amir Sahafi},
  title        = {An efficient distributed and secure algorithm for transaction confirmation
                  in {IOTA} using cloud computing},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {2},
  pages        = {1491--1521},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-023-05525-4},
  doi          = {10.1007/S11227-023-05525-4},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/AlavizadehEMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/QiZ24,
  author       = {Lijun Qi and
                  Jincheng Zhuang},
  title        = {RLWE-based public key searchable encryption: securer, faster, and
                  lower end-to-end delay for cloud computing},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {2},
  pages        = {2767--2798},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-023-05574-9},
  doi          = {10.1007/S11227-023-05574-9},
  timestamp    = {Fri, 02 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/QiZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/RaniRK24,
  author       = {S. Sheeja Rani and
                  P. V. Pravija Raj and
                  Ahmed M. Khedr},
  title        = {{SDESA:} secure cloud computing with gradient deep belief network
                  and congruential advanced encryption},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {15},
  pages        = {23147--23176},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-024-06322-3},
  doi          = {10.1007/S11227-024-06322-3},
  timestamp    = {Wed, 25 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/RaniRK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/WenLXTFH24,
  author       = {Wen Wen and
                  Lu Lu and
                  Renchao Xie and
                  Qinqin Tang and
                  Yuexia Fu and
                  Tao Huang},
  title        = {Secure incentive mechanism for energy trading in computing force networks
                  enabled internet of vehicles: a contract theory approach},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {18},
  pages        = {26061--26087},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-024-06369-2},
  doi          = {10.1007/S11227-024-06369-2},
  timestamp    = {Wed, 25 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/WenLXTFH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ZhangC24,
  author       = {Shiqiang Zhang and
                  Dongzhi Cao},
  title        = {A blockchain-based provably secure anonymous authentication for edge
                  computing-enabled IoT},
  journal      = {J. Supercomput.},
  volume       = {80},
  number       = {5},
  pages        = {6778--6808},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11227-023-05696-0},
  doi          = {10.1007/S11227-023-05696-0},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tjs/ZhangC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/LiuZW24,
  author       = {Jiayue Liu and
                  Jianguo Zhang and
                  Yuncai Wang},
  title        = {Secure Communication via Chaotic Synchronization Based on Reservoir
                  Computing},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {285--299},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3173516},
  doi          = {10.1109/TNNLS.2022.3173516},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/LiuZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SikarwarD24,
  author       = {Himani Sikarwar and
                  Debasis Das},
  title        = {SecEdge: Secure Edge-Computing-Based Hybrid Approach for Data Collection
                  and Searching in IoV},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {21},
  number       = {1},
  pages        = {1213--1225},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSM.2023.3299264},
  doi          = {10.1109/TNSM.2023.3299264},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/SikarwarD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/HuangMGWJ24,
  author       = {Haiyang Huang and
                  Tianhui Meng and
                  Jianxiong Guo and
                  Xuekai Wei and
                  Weijia Jia},
  title        = {SecEG: {A} Secure and Efficient Strategy against DDoS Attacks in Mobile
                  Edge Computing},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {20},
  number       = {3},
  pages        = {55:1--55:21},
  year         = {2024},
  url          = {https://doi.org/10.1145/3641106},
  doi          = {10.1145/3641106},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/HuangMGWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/KongQZYLC24,
  author       = {Qinglei Kong and
                  Xiaodong Qu and
                  Songnian Zhang and
                  Feng Yin and
                  Rongxing Lu and
                  Bo Chen},
  title        = {A Secure Satellite-Edge Computing Framework for Collaborative Line
                  Outage Identification in Smart Grid},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {761--775},
  year         = {2024},
  url          = {https://doi.org/10.1109/TSC.2023.3322432},
  doi          = {10.1109/TSC.2023.3322432},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/KongQZYLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/CuiZHXZ24,
  author       = {Mengmeng Cui and
                  Haochen Zhang and
                  Yong Huang and
                  Zhanyang Xu and
                  Qingzhan Zhao},
  title        = {A Fountain-Coding Based Cooperative Jamming Strategy for Secure Service
                  Migration in Edge Computing},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {5},
  pages        = {3643--3656},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-020-02537-3},
  doi          = {10.1007/S11276-020-02537-3},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/CuiZHXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/GuoS24,
  author       = {Jingjing Guo and
                  Jiacong Sun},
  title        = {Secure shortest distance queries over encrypted graph in cloud computing},
  journal      = {Wirel. Networks},
  volume       = {30},
  number       = {4},
  pages        = {2633--2646},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11276-024-03692-7},
  doi          = {10.1007/S11276-024-03692-7},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/GuoS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/PremkumarS24,
  author       = {N. Premkumar and
                  R. Santhosh},
  title        = {Secure Load Balancing in Fog Computing Using improved Tasmanian Devil
                  Optimization Algorithm with Blockchain},
  journal      = {Wirel. Pers. Commun.},
  volume       = {136},
  number       = {1},
  pages        = {547--565},
  year         = {2024},
  url          = {https://doi.org/10.1007/s11277-024-11321-x},
  doi          = {10.1007/S11277-024-11321-X},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/PremkumarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asap/SuW24,
  author       = {Haoran Su and
                  Nan Wu},
  title        = {Deoxys: Defensive Approximate Computing for Secure Graph Neural Networks},
  booktitle    = {35th {IEEE} International Conference on Application-specific Systems,
                  Architectures and Processors, {ASAP} 2024, Hong Kong, July 24-26,
                  2024},
  pages        = {54--60},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ASAP61560.2024.00022},
  doi          = {10.1109/ASAP61560.2024.00022},
  timestamp    = {Tue, 10 Sep 2024 15:34:15 +0200},
  biburl       = {https://dblp.org/rec/conf/asap/SuW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccwc/ZeraatkarKA24,
  author       = {Alireza Abolhasani Zeraatkar and
                  Parnian Shabani Kamran and
                  Hussain Al{-}Asaad},
  editor       = {Rajashree Paul and
                  Arpita Kundu},
  title        = {Advancements in Secure Computing: Exploring Automated Repair Debugging
                  and Verification Techniques for Hardware Design},
  booktitle    = {14th {IEEE} Annual Computing and Communication Workshop and Conference,
                  {CCWC} 2024, Las Vegas, NV, USA, January 8-10, 2024},
  pages        = {357--364},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CCWC60891.2024.10427806},
  doi          = {10.1109/CCWC60891.2024.10427806},
  timestamp    = {Thu, 29 Feb 2024 09:18:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ccwc/ZeraatkarKA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cmlds/ZhuLGW24,
  author       = {Hongbin Zhu and
                  Yunzhao Li and
                  Haoyu Gu and
                  Wanwan Wang},
  title        = {Secure Data Sharing Based on {SM9} for Privacy Preserving Computing},
  booktitle    = {Proceedings of the International Conference on Computing, Machine
                  Learning and Data Science, {CMLDS} 2024, Singapore, April 12-14, 2024},
  pages        = {34:1--34:4},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3661725.3661761},
  doi          = {10.1145/3661725.3661761},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cmlds/ZhuLGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csaide/LiuB24,
  author       = {Bin Liu and
                  Eric B. Blancaflor},
  title        = {Research on federal learning privacy protection based on secure multi-party
                  computing},
  booktitle    = {Proceedings of the 2024 3rd International Conference on Cyber Security,
                  Artificial Intelligence and Digital Economy, {CSAIDE} 2024, Nanjing,
                  China, March 1-3, 2024},
  pages        = {142--147},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3672919.3672947},
  doi          = {10.1145/3672919.3672947},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csaide/LiuB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscwd/YangWCLG024,
  author       = {Qian Yang and
                  Jiankai Wang and
                  Kai Chen and
                  Hongjia Li and
                  Haihua Gao and
                  Zhen Xu},
  editor       = {Weiming Shen and
                  Jean{-}Paul A. Barth{\`{e}}s and
                  Junzhou Luo and
                  Tie Qiu and
                  Xiaobo Zhou and
                  Jinghui Zhang and
                  Haibin Zhu and
                  Kunkun Peng and
                  Tianyi Xu and
                  Ning Chen},
  title        = {A Secure Blockchain-based Reputation Scheme for Data Offloading in
                  Edge Computing},
  booktitle    = {27th International Conference on Computer Supported Cooperative Work
                  in Design, {CSCWD} 2024, Tianjin, China, May 8-10, 2024},
  pages        = {2858--2863},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/CSCWD61410.2024.10580334},
  doi          = {10.1109/CSCWD61410.2024.10580334},
  timestamp    = {Mon, 29 Jul 2024 16:18:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cscwd/YangWCLG024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/elinfocom/KimTKB24,
  author       = {Taehoon Kim and
                  Manjoro Ashleigh Tatenda and
                  Soo Mee Kim and
                  Inkyu Bang},
  title        = {Channel-Aided Random Access for Supporting Secure Edge Computing},
  booktitle    = {International Conference on Electronics, Information, and Communication,
                  {ICEIC} 2024, Taipei, Taiwan, January 28-31, 2024},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICEIC61013.2024.10457100},
  doi          = {10.1109/ICEIC61013.2024.10457100},
  timestamp    = {Tue, 02 Apr 2024 21:06:16 +0200},
  biburl       = {https://dblp.org/rec/conf/elinfocom/KimTKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChiavassaGFM24,
  author       = {Pietro Chiavassa and
                  Filippo Gandino and
                  Renato Ferrero and
                  Jan Tobias M{\"{u}}hlberg},
  title        = {Secure Intermittent Computing with {ARM} TrustZone on the Cortex-M},
  booktitle    = {{IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}PW
                  2024, Vienna, Austria, July 8-12, 2024},
  pages        = {160--168},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/EuroSPW61312.2024.00022},
  doi          = {10.1109/EUROSPW61312.2024.00022},
  timestamp    = {Thu, 05 Sep 2024 16:02:09 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChiavassaGFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/AarellaYMK24,
  author       = {Seema G. Aarella and
                  Venkata Prasanth Yanambaka and
                  Saraju P. Mohanty and
                  Elias Kougianos},
  editor       = {Inna Partin{-}Vaisband and
                  Srinivas Katkoori and
                  Lu Peng and
                  Boris Vaisband and
                  Tooraj Nikoubin},
  title        = {Fortified-Edge 4.0: {A} ML-Based Error Correction Framework for Secure
                  Authentication in Collaborative Edge Computing},
  booktitle    = {Proceedings of the Great Lakes Symposium on {VLSI} 2024, {GLSVLSI}
                  2024, Clearwater, FL, USA, June 12-14, 2024},
  pages        = {639--644},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3649476.3660384},
  doi          = {10.1145/3649476.3660384},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/AarellaYMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/LeutheWDB24,
  author       = {Daniel Leuthe and
                  Florian Wei{\ss} and
                  Julian Dersch and
                  Michael Bitzer},
  editor       = {Tung X. Bui},
  title        = {Towards Secure Cloud-Computing in FinTechs - An Artefact for Prioritizing
                  Information Security Measures},
  booktitle    = {57th Hawaii International Conference on System Sciences, {HICSS} 2024,
                  Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January
                  3-6, 2024},
  pages        = {4568--4577},
  publisher    = {ScholarSpace},
  year         = {2024},
  url          = {https://hdl.handle.net/10125/106933},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/LeutheWDB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ShadabZL24,
  author       = {Rakin Muhammad Shadab and
                  Yu Zou and
                  Mingjie Lin},
  title        = {{CTR+:} {A} High-Performance Metadata Access Scheme for Secure Embedded
                  Memory in Heterogeneous Computing Systems},
  booktitle    = {{IEEE} International Symposium on Hardware Oriented Security and Trust,
                  {HOST} 2024, Tysons Corner, VA, USA, May 6-9, 2024},
  pages        = {304--308},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/HOST55342.2024.10545394},
  doi          = {10.1109/HOST55342.2024.10545394},
  timestamp    = {Wed, 19 Jun 2024 11:19:30 +0200},
  biburl       = {https://dblp.org/rec/conf/host/ShadabZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpca/NaKLH24,
  author       = {Seonjin Na and
                  Jungwoo Kim and
                  Sunho Lee and
                  Jaehyuk Huh},
  title        = {Supporting Secure Multi-GPU Computing with Dynamic and Batched Metadata
                  Management},
  booktitle    = {{IEEE} International Symposium on High-Performance Computer Architecture,
                  {HPCA} 2024, Edinburgh, United Kingdom, March 2-6, 2024},
  pages        = {204--217},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/HPCA57654.2024.00025},
  doi          = {10.1109/HPCA57654.2024.00025},
  timestamp    = {Thu, 02 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpca/NaKLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GauravGCA024a,
  author       = {Akshat Gaurav and
                  Brij B. Gupta and
                  Kwok Tai Chui and
                  Varsha Arya and
                  Jinsong Wu},
  title        = {Secure Integration of Internet of Things with Cloud Computing Using
                  Optimized Feature Selection and Convolutional Neural Network},
  booktitle    = {{IEEE} International Conference on Communications Workshops, {ICC}
                  2024 Workshops, Denver, CO, USA, June 9-13, 2024},
  pages        = {535--540},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCWorkshops59551.2024.10615516},
  doi          = {10.1109/ICCWORKSHOPS59551.2024.10615516},
  timestamp    = {Wed, 21 Aug 2024 14:57:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GauravGCA024a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/ChenLXLGZ24,
  author       = {Yuliang Chen and
                  Xi Lin and
                  Hansong Xu and
                  Siyi Liao and
                  Jin Guo and
                  Chunming Zou},
  title        = {Leveraging Blockchain and Coded Computing for Secure Edge Collaborate
                  Learning in Industrial IoT},
  booktitle    = {33rd International Conference on Computer Communications and Networks,
                  {ICCCN} 2024, Kailua-Kona, HI, USA, July 29-31, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/ICCCN61486.2024.10637571},
  doi          = {10.1109/ICCCN61486.2024.10637571},
  timestamp    = {Tue, 10 Sep 2024 15:34:17 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/ChenLXLGZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/JiaSFCSZ24,
  author       = {Guoqing Jia and
                  Changhui Sun and
                  Weidong Fang and
                  Wei Chen and
                  Guannan Song and
                  Wuxiong Zhang},
  editor       = {De{-}Shuang Huang and
                  Xiankun Zhang and
                  Chuanlei Zhang},
  title        = {Trusted Secure Routing Schemes Based on Intelligent Computing: {A}
                  Brief Review},
  booktitle    = {Advanced Intelligent Computing Technology and Applications - 20th
                  International Conference, {ICIC} 2024, Tianjin, China, August 5-8,
                  2024, Proceedings, Part {V} {(LNAI)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14879},
  pages        = {275--284},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-5675-9\_24},
  doi          = {10.1007/978-981-97-5675-9\_24},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/JiaSFCSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/WangFNYCCZ24,
  author       = {Tian Wang and
                  Weidong Fang and
                  Mufan Ni and
                  Xiaoliang Yang and
                  Wei Chen and
                  Wentao Chen and
                  Wuxiong Zhang},
  editor       = {De{-}Shuang Huang and
                  Wei Chen and
                  Yijie Pan},
  title        = {Intelligent Computing Making Access Control More Secure: From Cipher
                  to Trust},
  booktitle    = {Advanced Intelligent Computing Technology and Applications - 20th
                  International Conference, {ICIC} 2024, Tianjin, China, August 5-8,
                  2024, Proceedings, Part {VIII}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14869},
  pages        = {307--317},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-97-5603-2\_25},
  doi          = {10.1007/978-981-97-5603-2\_25},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/WangFNYCCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pais/BounairaAS24,
  author       = {Soumaya Bounaira and
                  Ahmed Alioua and
                  Ismahane Souici},
  editor       = {Messaoud Abbas and
                  Makhlouf Derdour and
                  Mohammed Mounir Bouhamed and
                  Saci Medileh and
                  Abdelkamel Ben Ali and
                  Nassira Ghoualmi{-}Zine},
  title        = {Trust-Based Secure Task Offloading in Digital Twin Empowered Vehicular
                  Edge Computing},
  booktitle    = {6th International Conference on Pattern Analysis and Intelligent Systems,
                  {PAIS} 2024, El Oued, Algeria, April 24-25, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/PAIS62114.2024.10541161},
  doi          = {10.1109/PAIS62114.2024.10541161},
  timestamp    = {Sun, 04 Aug 2024 19:39:59 +0200},
  biburl       = {https://dblp.org/rec/conf/pais/BounairaAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/qse-ne/ZohaibAH24,
  author       = {Muhammad Zohaib and
                  Fahad S. Altuwaijri and
                  Sami Hyrynsalmi},
  editor       = {Arif Ali Khan and
                  Muhammad Azeem Akbar and
                  Peng Liang},
  title        = {Integrating Quantum Computing and Blockchain: Building the Foundations
                  of Secure, Efficient 6G Technology},
  booktitle    = {Proceedings of the 1st {ACM} International Workshop on Quantum Software
                  Engineering: The Next Evolution, {QSE-NE} 2024, Porto de Galinhas,
                  Brazil, 16 July 2024},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3663531.3664755},
  doi          = {10.1145/3663531.3664755},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/qse-ne/ZohaibAH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/syscon/XieK24,
  author       = {Derock Xie and
                  Anup Kumar},
  title        = {Encblock: Enclave and Blockchain-enabled Secure Data Sharing and Computing
                  for Power Grids},
  booktitle    = {{IEEE} International Systems Conference, SysCon 2024, Montreal, QC,
                  Canada, April 15-18, 2024},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/SysCon61195.2024.10553589},
  doi          = {10.1109/SYSCON61195.2024.10553589},
  timestamp    = {Mon, 24 Jun 2024 15:01:05 +0200},
  biburl       = {https://dblp.org/rec/conf/syscon/XieK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ZhangGL24,
  author       = {Zhen Zhang and
                  Bing Guo and
                  Chengjie Li},
  title        = {ComChain: An Efficient and Secure Reputation-Driven Blockchain for
                  Collaborative Edge-End Computing with Sharding},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2024,
                  Dubai, United Arab Emirates, April 21-24, 2024},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/WCNC57260.2024.10571075},
  doi          = {10.1109/WCNC57260.2024.10571075},
  timestamp    = {Mon, 15 Jul 2024 15:18:26 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/ZhangGL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/DamgardKNOP24,
  author       = {Ivan Damg{\aa}rd and
                  Hannah Keller and
                  Boel Nelson and
                  Claudio Orlandi and
                  Rasmus Pagh},
  editor       = {Tat{-}Seng Chua and
                  Chong{-}Wah Ngo and
                  Ravi Kumar and
                  Hady W. Lauw and
                  Roy Ka{-}Wei Lee},
  title        = {Differentially Private Selection from Secure Distributed Computing},
  booktitle    = {Proceedings of the {ACM} on Web Conference 2024, {WWW} 2024, Singapore,
                  May 13-17, 2024},
  pages        = {1103--1114},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3589334.3645435},
  doi          = {10.1145/3589334.3645435},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/DamgardKNOP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-06384,
  author       = {Muhammad Baqer Mollah and
                  Md. Abul Kalam Azad and
                  Yinghui Zhang},
  title        = {Secure Targeted Message Dissemination in IoT Using Blockchain Enabled
                  Edge Computing},
  journal      = {CoRR},
  volume       = {abs/2401.06384},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.06384},
  doi          = {10.48550/ARXIV.2401.06384},
  eprinttype    = {arXiv},
  eprint       = {2401.06384},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-06384.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-12271,
  author       = {Zilinghan Li and
                  Shilan He and
                  Pranshu Chaturvedi and
                  Volodymyr V. Kindratenko and
                  Eliu A. Huerta and
                  Kibaek Kim and
                  Ravi K. Madduri},
  title        = {Secure Federated Learning Across Heterogeneous Cloud and High-Performance
                  Computing Resources - {A} Case Study on Federated Fine-tuning of LLaMA
                  2},
  journal      = {CoRR},
  volume       = {abs/2402.12271},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.12271},
  doi          = {10.48550/ARXIV.2402.12271},
  eprinttype    = {arXiv},
  eprint       = {2402.12271},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-12271.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-16431,
  author       = {Shanuja Sasi and
                  Onur G{\"{u}}nl{\"{u}}},
  title        = {Secure Coded Distributed Computing},
  journal      = {CoRR},
  volume       = {abs/2404.16431},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.16431},
  doi          = {10.48550/ARXIV.2404.16431},
  eprinttype    = {arXiv},
  eprint       = {2404.16431},
  timestamp    = {Mon, 03 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-16431.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2405-17008,
  author       = {Claudio Cicconetti and
                  Dario Sabella and
                  Pietro Noviello and
                  Gennaro Davide Paduanelli},
  title        = {Quantum-safe Edge Applications: How to Secure Computation in Distributed
                  Computing Systems},
  journal      = {CoRR},
  volume       = {abs/2405.17008},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2405.17008},
  doi          = {10.48550/ARXIV.2405.17008},
  eprinttype    = {arXiv},
  eprint       = {2405.17008},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2405-17008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-04747,
  author       = {Houming Qiu and
                  Kun Zhu and
                  Nguyen Cong Luong and
                  Dusit Niyato},
  title        = {Approximated Coded Computing: Towards Fast, Private and Secure Distributed
                  Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2406.04747},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.04747},
  doi          = {10.48550/ARXIV.2406.04747},
  eprinttype    = {arXiv},
  eprint       = {2406.04747},
  timestamp    = {Sat, 13 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-04747.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2406-19964,
  author       = {Xirong Ma and
                  Chuan Li and
                  Yuchang Hu and
                  Yunting Tao and
                  Yali Jiang and
                  Yanbin Li and
                  Fanyu Kong and
                  Chunpeng Ge},
  title        = {Secure Outsourced Decryption for HE-based Privacy-preserving Cloud
                  Computing System},
  journal      = {CoRR},
  volume       = {abs/2406.19964},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2406.19964},
  doi          = {10.48550/ARXIV.2406.19964},
  eprinttype    = {arXiv},
  eprint       = {2406.19964},
  timestamp    = {Wed, 24 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2406-19964.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-00347,
  author       = {Zefan Wang and
                  Yitong Wang and
                  Jun Zhao},
  title        = {Resource Allocation and Secure Wireless Communication in the Large
                  Model-based Mobile Edge Computing System},
  journal      = {CoRR},
  volume       = {abs/2407.00347},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.00347},
  doi          = {10.48550/ARXIV.2407.00347},
  eprinttype    = {arXiv},
  eprint       = {2407.00347},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-00347.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-08903,
  author       = {Husheng Han and
                  Xinyao Zheng and
                  Yuanbo Wen and
                  Yifan Hao and
                  Erhu Feng and
                  Ling Liang and
                  Jianan Mu and
                  Xiaqing Li and
                  TianYun Ma and
                  Pengwei Jin and
                  Xinkai Song and
                  Zidong Du and
                  Qi Guo and
                  Xing Hu},
  title        = {TensorTEE: Unifying Heterogeneous {TEE} Granularity for Efficient
                  Secure Collaborative Tensor Computing},
  journal      = {CoRR},
  volume       = {abs/2407.08903},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.08903},
  doi          = {10.48550/ARXIV.2407.08903},
  eprinttype    = {arXiv},
  eprint       = {2407.08903},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-08903.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OhbaSGM24,
  author       = {Yoshihiro Ohba and
                  Tomoya Sanuki and
                  Claude Gravel and
                  Kentaro Mihara},
  title        = {An NVMe-based Secure Computing Platform with FPGA-based {TFHE} Accelerator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/744},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OhbaSGM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasiG24,
  author       = {Shanuja Sasi and
                  Onur G{\"{u}}nl{\"{u}}},
  title        = {Secure Coded Distributed Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/672},
  timestamp    = {Wed, 29 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasiG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Parimala23,
  author       = {Helen Parimala},
  title        = {A Secured Architecture for Mitigating Distributed Denial of Service
                  Attack Integrating Internet of Things and Cloud Computing},
  school       = {Bharathidasan University, Tiruchirappalli, Tamil Nadu, India},
  year         = {2023},
  url          = {https://www.grin.com/document/1306455},
  urn          = {urn:nbn:de:101:1-2023011002311334081172},
  isbn         = {978-3-346-78836-8},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/dnb/Parimala23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Streit23,
  author       = {Franz{-}Josef Streit},
  title        = {Techniques to Secure HW/SW-Programmable SoC Architectures for Edge
                  Computing},
  school       = {University of Erlangen-Nuremberg, Germany},
  year         = {2023},
  url          = {https://opus4.kobv.de/opus4-fau/frontdoor/index/index/docId/21375},
  urn          = {urn:nbn:de:bvb:29-opus4-213757},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Streit23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Akram23,
  author       = {Ayaz Akram},
  title        = {Hardware/Software Co-Design for Secure High Performance Computing
                  Systems},
  school       = {University of California, Davis, {USA}},
  year         = {2023},
  url          = {https://www.escholarship.org/uc/item/83r536h8},
  timestamp    = {Mon, 09 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Akram23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/utcs/Kizza23,
  author       = {Joseph Migga Kizza},
  title        = {Ethical and Secure Computing - {A} Concise Module, Third Edition},
  series       = {Undergraduate Topics in Computer Science},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31906-8},
  doi          = {10.1007/978-3-031-31906-8},
  isbn         = {978-3-031-31905-1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/utcs/Kizza23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/GunasekaranK23,
  author       = {Sathish Gunasekaran and
                  Manish Kumar},
  title        = {Chapter Nine - Secure data communication using {DNA} computing adaptable
                  to wireless sensor network},
  journal      = {Adv. Comput.},
  volume       = {129},
  pages        = {317--361},
  year         = {2023},
  url          = {https://doi.org/10.1016/bs.adcom.2022.08.008},
  doi          = {10.1016/BS.ADCOM.2022.08.008},
  timestamp    = {Sun, 02 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/GunasekaranK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AsaithambiRDVSKA23,
  author       = {Sasikumar Asaithambi and
                  Logesh Ravi and
                  Malathi Devarajan and
                  Subramaniyaswamy Vairavasundaram and
                  A. Selvalakshmi and
                  Ketan Kotecha and
                  Ajith Abraham},
  title        = {A Decentralized Resource Allocation in Edge Computing for Secure IoT
                  Environments},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {117177--117189},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3325056},
  doi          = {10.1109/ACCESS.2023.3325056},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/AsaithambiRDVSKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IrshadHHAYAAABBR23,
  author       = {Reyazur Rashid Irshad and
                  Shahid Hussain and
                  Ihtisham Hussain and
                  Ibrar Ahmad and
                  Adil Yousif and
                  Ibrahim M. Alwayle and
                  Ahmed Abdu Alattab and
                  Khaled M. Alalayah and
                  John G. Breslin and
                  Mohammed Mehdi Badr and
                  Joel J. P. C. Rodrigues},
  title        = {An Intelligent Buffalo-Based Secure Edge-Enabled Computing Platform
                  for Heterogeneous IoT Network in Smart Cities},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {69282--69294},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3288815},
  doi          = {10.1109/ACCESS.2023.3288815},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/IrshadHHAYAAABBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IrshadHHNZAAYA23,
  author       = {Reyazur Rashid Irshad and
                  Shahid Hussain and
                  Ihtisham Hussain and
                  Jamal Abdul Nasir and
                  Asim Zeb and
                  Khaled M. Alalayah and
                  Ahmed Abdu Alattab and
                  Adil Yousif and
                  Ibrahim M. Alwayle},
  title        = {IoT-Enabled Secure and Scalable Cloud Architecture for Multi-User
                  Systems: {A} Hybrid Post-Quantum Cryptographic and Blockchain-Based
                  Approach Toward a Trustworthy Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {105479--105498},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3318755},
  doi          = {10.1109/ACCESS.2023.3318755},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/IrshadHHNZAAYA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanGSAAK23,
  author       = {Imran Khan and
                  Anwar Ghani and
                  Syed Muhammd Saqlain and
                  Muhammad Usman Ashraf and
                  Abdulrahman Alzahrani and
                  DoHyeun Kim},
  title        = {Secure Medical Data Against Unauthorized Access Using Decoy Technology
                  in Distributed Edge Computing Networks},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {144560--144573},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3344168},
  doi          = {10.1109/ACCESS.2023.3344168},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KhanGSAAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/KhezrYB23,
  author       = {Seyed Nima Khezr and
                  Abdulsalam Yassine and
                  Rachid Benlamri},
  title        = {Towards a secure and dependable IoT data monetization using blockchain
                  and fog computing},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {2},
  pages        = {1551--1564},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-022-03669-1},
  doi          = {10.1007/S10586-022-03669-1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/KhezrYB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SinghC23,
  author       = {Ashish Singh and
                  Kakali Chatterjee},
  title        = {Edge computing based secure health monitoring framework for electronic
                  healthcare system},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {2},
  pages        = {1205--1220},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-022-03717-w},
  doi          = {10.1007/S10586-022-03717-W},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/SinghC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhaoHZZ23,
  author       = {Yan Zhao and
                  Ning Hu and
                  Yue Zhao and
                  Zhihan Zhu},
  title        = {A secure and flexible edge computing scheme for AI-driven industrial
                  IoT},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {1},
  pages        = {283--301},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-021-03400-6},
  doi          = {10.1007/S10586-021-03400-6},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhaoHZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChenNLLL23,
  author       = {Jie Chen and
                  Jiaxu Niu and
                  Hao Lei and
                  Li Lin and
                  Yunhao Ling},
  title        = {Adaptively secure multi-authority attribute-based broadcast encryption
                  in fog computing},
  journal      = {Comput. Networks},
  volume       = {232},
  pages        = {109844},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109844},
  doi          = {10.1016/J.COMNET.2023.109844},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ChenNLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChengJYZG23,
  author       = {Zhimo Cheng and
                  Xinsheng Ji and
                  Wei You and
                  Yu Zhao and
                  Zhongfu Guo},
  title        = {{SECHO:} {A} deep reinforcement learning-based scheme for secure handover
                  in mobile edge computing},
  journal      = {Comput. Networks},
  volume       = {229},
  pages        = {109769},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.109769},
  doi          = {10.1016/J.COMNET.2023.109769},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/ChengJYZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangCWYL23,
  author       = {Yu Wang and
                  Liquan Chen and
                  Ge Wu and
                  Kunliang Yu and
                  Tianyu Lu},
  title        = {Efficient and secure content-based image retrieval with deep neural
                  networks in the mobile cloud computing},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103163},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103163},
  doi          = {10.1016/J.COSE.2023.103163},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangCWYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangJYWK23,
  author       = {Wenfang Zhang and
                  Heng Jiao and
                  Zhuoqun Yan and
                  Xiaomin Wang and
                  Muhammad Khurram Khan},
  title        = {Security analysis and improvement of a public auditing scheme for
                  secure data storage in fog-to-cloud computing},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103019},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103019},
  doi          = {10.1016/J.COSE.2022.103019},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangJYWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/CarrizalesEspinozaSCC23,
  author       = {Diana Carrizales{-}Espinoza and
                  Dante D. S{\'{a}}nchez{-}Gallegos and
                  Jos{\'{e}} Luis Gonz{\'{a}}lez Compe{\'{a}}n and
                  Jes{\'{u}}s Carretero},
  title        = {FedFlow: a federated platform to build secure sharing and synchronization
                  services for health dataflows},
  journal      = {Computing},
  volume       = {105},
  number       = {5},
  pages        = {1019--1037},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00607-021-01044-3},
  doi          = {10.1007/S00607-021-01044-3},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/CarrizalesEspinozaSCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/WangHMZZ23,
  author       = {Cong Wang and
                  Peng Huo and
                  Maode Ma and
                  Tong Zhou and
                  Yiying Zhang},
  title        = {A provable secure and lightweight ECC-based authenticated key agreement
                  scheme for edge computing infrastructure in smart grid},
  journal      = {Computing},
  volume       = {105},
  number       = {11},
  pages        = {2511--2537},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00607-023-01188-4},
  doi          = {10.1007/S00607-023-01188-4},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/WangHMZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiuWLLL23,
  author       = {Tonglai Liu and
                  Jigang Wu and
                  Jiaxing Li and
                  Jingyi Li and
                  Yidong Li},
  title        = {Efficient decentralized access control for secure data sharing in
                  cloud computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {17},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.6383},
  doi          = {10.1002/CPE.6383},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiuWLLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csysl/MarcantoniJCB23,
  author       = {Matteo Marcantoni and
                  Bayu Jayawardhana and
                  Mariano Perez Chaher and
                  Kerstin Bunte},
  title        = {Secure Formation Control via Edge Computing Enabled by Fully Homomorphic
                  Encryption and Mixed Uniform-Logarithmic Quantization},
  journal      = {{IEEE} Control. Syst. Lett.},
  volume       = {7},
  pages        = {395--400},
  year         = {2023},
  url          = {https://doi.org/10.1109/LCSYS.2022.3188944},
  doi          = {10.1109/LCSYS.2022.3188944},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csysl/MarcantoniJCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/LiuLJ23,
  author       = {Dengzhi Liu and
                  Zhimin Li and
                  Dongbao Jia},
  title        = {Secure distributed data integrity auditing with high efficiency in
                  5G-enabled software-defined edge computing},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100004},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100004},
  doi          = {10.1016/J.CSA.2022.100004},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/LiuLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SheikM23,
  author       = {Syed Amma Sheik and
                  Amutha Prabakar Muniyandi},
  title        = {Secure authentication schemes in cloud computing with glimpse of artificial
                  neural networks: {A} review},
  journal      = {Cyber Secur. Appl.},
  volume       = {1},
  pages        = {100002},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csa.2022.100002},
  doi          = {10.1016/J.CSA.2022.100002},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SheikM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcan/RahmanIBMHT23,
  author       = {Anichur Rahman and
                  Md. Jahidul Islam and
                  Shahab S. Band and
                  Ghulam Muhammad and
                  Kamrul Hasan and
                  Prayag Tiwari},
  title        = {Towards a blockchain-SDN-based secure architecture for cloud computing
                  in smart industrial IoT},
  journal      = {Digit. Commun. Networks},
  volume       = {9},
  number       = {2},
  pages        = {411--421},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dcan.2022.11.003},
  doi          = {10.1016/J.DCAN.2022.11.003},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcan/RahmanIBMHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/BosioBSHT23,
  author       = {Alberto Bosio and
                  Mario Barbareschi and
                  Alessandro Savino and
                  Jie Han and
                  J{\"{u}}rgen Teich},
  title        = {Special Issue on Approximate Computing: Challenges, Methodologies,
                  Algorithms, and Architectures for Dependable and Secure Systems},
  journal      = {{IEEE} Des. Test},
  volume       = {40},
  number       = {3},
  pages        = {5--7},
  year         = {2023},
  url          = {https://doi.org/10.1109/MDAT.2022.3221909},
  doi          = {10.1109/MDAT.2022.3221909},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/BosioBSHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/Pande23b,
  author       = {Partha Pratim Pande},
  title        = {Approximate Computing: Challenges, Methodologies, Algorithms, and
                  Architectures for Dependable and Secure Systems},
  journal      = {{IEEE} Des. Test},
  volume       = {40},
  number       = {3},
  pages        = {4},
  year         = {2023},
  url          = {https://doi.org/10.1109/MDAT.2023.3261801},
  doi          = {10.1109/MDAT.2023.3261801},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/Pande23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/GowdaMML23,
  author       = {Naveen Chandra Gowda and
                  Sunilkumar S. Manvi and
                  A. Bharathi Malakreddy and
                  Pascal Lorenz},
  title        = {{BSKM-FC:} Blockchain-based secured key management in a fog computing
                  environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {142},
  pages        = {276--291},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.future.2022.12.042},
  doi          = {10.1016/J.FUTURE.2022.12.042},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/GowdaMML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/grid/ZhangTWKW23,
  author       = {Shuangshuang Zhang and
                  Yue Tang and
                  Dinghui Wang and
                  Noorliza Karia and
                  Chenguang Wang},
  title        = {Secured {SDN} Based Task Scheduling in Edge Computing for Smart City
                  Health Monitoring Operation Management System},
  journal      = {J. Grid Comput.},
  volume       = {21},
  number       = {4},
  pages        = {71},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10723-023-09707-5},
  doi          = {10.1007/S10723-023-09707-5},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/grid/ZhangTWKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LandwehrRWTJKK23,
  author       = {Carl E. Landwehr and
                  Michael K. Reiter and
                  Laurie A. Williams and
                  Gene Tsudik and
                  Trent Jaeger and
                  Tadayoshi Kohno and
                  Apu Kapadia},
  title        = {Looking Backwards (and Forwards): {NSF} Secure and Trustworthy Computing
                  20-Year Retrospective Panel Transcription},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {21},
  number       = {2},
  pages        = {32--42},
  year         = {2023},
  url          = {https://doi.org/10.1109/MSEC.2022.3208721},
  doi          = {10.1109/MSEC.2022.3208721},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LandwehrRWTJKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/JinLGWXL23,
  author       = {Leisheng Jin and
                  Zhuo Liu and
                  Ai Guan and
                  Zhen Wang and
                  Rui Xue and
                  Lijie Li},
  title        = {A high efficient next generation reservoir computing to predict and
                  generate chaos with application for secure communication},
  journal      = {{IET} Commun.},
  volume       = {17},
  number       = {4},
  pages        = {489--496},
  year         = {2023},
  url          = {https://doi.org/10.1049/cmu2.12559},
  doi          = {10.1049/CMU2.12559},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/JinLGWXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/KodadaD23,
  author       = {Basappa B. Kodada and
                  Demian Antony D'Mello},
  title        = {{FSACE:} finite state automata-based client-side encryption for secure
                  data deduplication in cloud computing},
  journal      = {Int. J. Cloud Comput.},
  volume       = {12},
  number       = {6},
  pages        = {531--555},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJCC.2023.134644},
  doi          = {10.1504/IJCC.2023.134644},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcc/KodadaD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/DharminderM23,
  author       = {Dharminder Dharminder and
                  Dheerendra Mishra},
  title        = {{PSMECS:} {A} provably secure ID-based communication in mobile edge
                  computing},
  journal      = {Int. J. Commun. Syst.},
  volume       = {36},
  number       = {12},
  year         = {2023},
  url          = {https://doi.org/10.1002/dac.4116},
  doi          = {10.1002/DAC.4116},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/DharminderM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/SutarMK23,
  author       = {Swapnil Sutar and
                  Priyanka Mekala and
                  U. Surya Kameswari},
  title        = {Secured IoT node design through protected {ITULES} family group-II
                  {(ULWC)} implementation against physical attacks for ubiquitous computing},
  journal      = {Int. J. Embed. Syst.},
  volume       = {16},
  number       = {4},
  pages        = {288--311},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJES.2023.139205},
  doi          = {10.1504/IJES.2023.139205},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/SutarMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiei/YadavM23,
  author       = {Monika Yadav and
                  Atul Mishra},
  title        = {Secure task scheduling in cloud computing with enhanced ordinal optimisation
                  and integrated DNA, Morse code techniques},
  journal      = {Int. J. Intell. Eng. Informatics},
  volume       = {11},
  number       = {2},
  pages        = {155--175},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIEI.2023.132700},
  doi          = {10.1504/IJIEI.2023.132700},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiei/YadavM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SamriyaKG23,
  author       = {Jitendra Kumar Samriya and
                  Mohit Kumar and
                  Sukhpal Singh Gill},
  title        = {Secured data offloading using reinforcement learning and Markov decision
                  process in mobile edge computing},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2243},
  doi          = {10.1002/NEM.2243},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SamriyaKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/SongLBZT23,
  author       = {Wenjun Song and
                  Mengqi Liu and
                  Thar Baker and
                  Qikun Zhang and
                  Yu{-}an Tan},
  title        = {A group key exchange and secure data sharing based on privacy protection
                  for federated learning in edge-cloud collaborative computing environment},
  journal      = {Int. J. Netw. Manag.},
  volume       = {33},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/nem.2225},
  doi          = {10.1002/NEM.2225},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/SongLBZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijseke/WangCLH23,
  author       = {Xuguo Wang and
                  Ligeng Chen and
                  Yu Liang and
                  Hao Huang},
  title        = {NISe: Non-Invasive Secure Framework for Multi-Access Edge Computing},
  journal      = {Int. J. Softw. Eng. Knowl. Eng.},
  volume       = {33},
  number       = {9},
  pages        = {1467--1488},
  year         = {2023},
  url          = {https://doi.org/10.1142/S0218194023500390},
  doi          = {10.1142/S0218194023500390},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijseke/WangCLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informatics/BallhausenH23,
  author       = {Hendrik Ballhausen and
                  Ludwig Christian G. Hinske},
  title        = {Federated Secure Computing},
  journal      = {Informatics},
  volume       = {10},
  number       = {4},
  pages        = {83},
  year         = {2023},
  url          = {https://doi.org/10.3390/informatics10040083},
  doi          = {10.3390/INFORMATICS10040083},
  timestamp    = {Sat, 23 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informatics/BallhausenH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/MorabitoSRCC23,
  author       = {Gabriele Morabito and
                  Christian Sicari and
                  Armando Ruggeri and
                  Antonio Celesti and
                  Lorenzo Carnevale},
  title        = {Secure-by-design serverless workflows on the Edge-Cloud Continuum
                  through the Osmotic Computing paradigm},
  journal      = {Internet Things},
  volume       = {22},
  pages        = {100737},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100737},
  doi          = {10.1016/J.IOT.2023.100737},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iot/MorabitoSRCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iot/YaoGWY23,
  author       = {Mengting Yao and
                  Qingqing Gan and
                  Xiaoming Wang and
                  Yuhao Yang},
  title        = {A key-insulated secure multi-server authenticated key agreement protocol
                  for edge computing-based VANETs},
  journal      = {Internet Things},
  volume       = {21},
  pages        = {100679},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iot.2023.100679},
  doi          = {10.1016/J.IOT.2023.100679},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iot/YaoGWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiLZ23,
  author       = {Jiahao Li and
                  Dongmei Li and
                  Xiaomei Zhang},
  title        = {A Secure Blockchain-Assisted Access Control Scheme for Smart Healthcare
                  System in Fog Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {18},
  pages        = {15980--15989},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3268278},
  doi          = {10.1109/JIOT.2023.3268278},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MooreIRA23,
  author       = {Ervin Moore and
                  Ahmed Imteaj and
                  Shabnam Rezapour and
                  M. Hadi Amini},
  title        = {A Survey on Secure and Private Federated Learning Using Blockchain:
                  Theory and Application in Resource-Constrained Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {24},
  pages        = {21942--21958},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3313055},
  doi          = {10.1109/JIOT.2023.3313055},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/MooreIRA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SankaranSG23,
  author       = {Ganesh Chennimala Sankaran and
                  Krishna M. Sivalingam and
                  Harsh Gondaliya},
  title        = {{P4} and NetFPGA-Based Secure In-Network Computing Architecture for
                  AI-Enabled Industrial Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {4},
  pages        = {2979--2994},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2021.3125862},
  doi          = {10.1109/JIOT.2021.3125862},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/SankaranSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SinghCSK23,
  author       = {Ashish Singh and
                  Kakali Chatterjee and
                  Anish Kumar Singh and
                  Neeraj Kumar},
  title        = {Secure Smart Healthcare Framework Using Lightweight {DNA} Sequence
                  and Chaos for Mobile-Edge Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {6, March 15},
  pages        = {4883--4890},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3219113},
  doi          = {10.1109/JIOT.2022.3219113},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SinghCSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TianLLXZH23,
  author       = {Wenlong Tian and
                  Qi Liu and
                  Ruixuan Li and
                  Zhiyong Xu and
                  Yan Zhang and
                  Yongfeng Huang},
  title        = {A Blockchain-Based Secure Searching Strategy for Metadata in Mobile
                  Edge Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {22},
  pages        = {19795--19809},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3282043},
  doi          = {10.1109/JIOT.2023.3282043},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/TianLLXZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuYZCG23,
  author       = {Dongyang Xu and
                  Keping Yu and
                  Li Zhen and
                  Kim{-}Kwang Raymond Choo and
                  Mohsen Guizani},
  title        = {Quantum Learning on Structured Code With Computing Traps for Secure
                  {URLLC} in Industrial IoT Scenarios},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {18},
  pages        = {16516--16530},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3268608},
  doi          = {10.1109/JIOT.2023.3268608},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/XuYZCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangWQLX23,
  author       = {Yifang Zhang and
                  Shengling Wang and
                  Xidi Qu and
                  Chunxiao Li and
                  Enliang Xu},
  title        = {Toward Secure and Efficient Collaborative Cached Data Auditing for
                  Distributed Fog Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {23},
  pages        = {20941--20954},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3284345},
  doi          = {10.1109/JIOT.2023.3284345},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangWQLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YaoWYLWJH23,
  author       = {Lisha Yao and
                  Jian Weng and
                  Anjia Yang and
                  Xiaojian Liang and
                  Zhenghao Wu and
                  Zike Jiang and
                  Lin Hou},
  title        = {Scalable CCA-secure public-key authenticated encryption with keyword
                  search from ideal lattices in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {624},
  pages        = {777--795},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2022.12.035},
  doi          = {10.1016/J.INS.2022.12.035},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/YaoWYLWJH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AliHHHY23,
  author       = {Muqadar Ali and
                  Hongjie He and
                  Abid Hussain and
                  Mehboob Hussain and
                  Yuan Yuan},
  title        = {Efficient Secure Privacy Preserving Multi Keywords Rank Search over
                  Encrypted Data in Cloud Computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103500},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103500},
  doi          = {10.1016/J.JISA.2023.103500},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AliHHHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/ChakrabortyKC23,
  author       = {Ananya Chakraborty and
                  Mohit Kumar and
                  Nisha Chaurasia},
  title        = {Secure framework for IoT applications using Deep Learning in fog Computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {77},
  pages        = {103569},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103569},
  doi          = {10.1016/J.JISA.2023.103569},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/ChakrabortyKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SaleemWI23,
  author       = {Mahreen Saleem and
                  M. R. Warsi and
                  Saiful Islam},
  title        = {Secure information processing for multimedia forensics using zero-trust
                  security model for large scale data analytics in SaaS cloud computing
                  environment},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {72},
  pages        = {103389},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2022.103389},
  doi          = {10.1016/J.JISA.2022.103389},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/SaleemWI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iswa/AjaoA23,
  author       = {Lukman Adewale Ajao and
                  Simon Tooswem Apeh},
  title        = {Secure edge computing vulnerabilities in smart cities sustainability
                  using petri net and genetic algorithm-based reinforcement learning},
  journal      = {Intell. Syst. Appl.},
  volume       = {18},
  pages        = {200216},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.iswa.2023.200216},
  doi          = {10.1016/J.ISWA.2023.200216},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iswa/AjaoA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itl/HammedA23,
  author       = {Shahul Hammed and
                  Balachandran Arunkumar},
  title        = {A cost effective- secure algorithm for work-flow scheduling in cloud
                  computing},
  journal      = {Internet Technol. Lett.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/itl2.233},
  doi          = {10.1002/ITL2.233},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itl/HammedA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/SubbarajTR23,
  author       = {Saroja Subbaraj and
                  Revathi Thiyagarajan and
                  Madavan Rengaraj},
  title        = {A smart fog computing based real-time secure resource allocation and
                  scheduling strategy using multi-objective crow search algorithm},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {1003--1015},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12652-021-03354-y},
  doi          = {10.1007/S12652-021-03354-Y},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/SubbarajTR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/SuganyaS23,
  author       = {M. Suganya and
                  T. Sasipraba},
  title        = {Stochastic Gradient Descent long short-term memory based secure encryption
                  algorithm for cloud data storage and retrieval in cloud computing
                  environment},
  journal      = {J. Cloud Comput.},
  volume       = {12},
  number       = {1},
  pages        = {74},
  year         = {2023},
  url          = {https://doi.org/10.1186/s13677-023-00442-6},
  doi          = {10.1186/S13677-023-00442-6},
  timestamp    = {Thu, 18 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/SuganyaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/HsuWF23,
  author       = {Ruei{-}Hau Hsu and
                  Lu{-}Chin Wang and
                  Hsiang{-}Shian Fan},
  title        = {Universally Secure Device-to-Device Communications with Privacy Protection
                  and Fine-grained Access Control Based on 5G-enabled Multi-access Edge
                  Computing},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {39},
  number       = {3},
  pages        = {507--524},
  year         = {2023},
  url          = {http://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=192\_2586},
  timestamp    = {Mon, 29 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/HsuWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AjwadAKJM23,
  author       = {Asmaa Abbas Ajwad and
                  Ammar Abdulrahman Ahmed and
                  Muntaha Kamal and
                  Refed Adnan Jaleel and
                  Marium Basheer Mahmood},
  title        = {Improved Secure IoTs-Based Visual Computing with Image Processing
                  and Artificial Intelligence Techniques for Accurate Predicting of
                  Novel {COVID}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.001},
  doi          = {10.58346/JOWUA.2023.I1.001},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AjwadAKJM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LavanyaS23,
  author       = {S. Lavanya and
                  N. M. Saravanakumar},
  title        = {Secured two factor authentication, graph based replication and encryption
                  strategy in cloud computing},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {11},
  pages        = {16105--16125},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-022-13838-4},
  doi          = {10.1007/S11042-022-13838-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LavanyaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/FoxSXBMPC23,
  author       = {Anthony C. J. Fox and
                  Gareth Stockwell and
                  Shale Xiong and
                  Hanno Becker and
                  Dominic P. Mulligan and
                  Gustavo Petri and
                  Nathan Chong},
  title        = {A Verification Methodology for the Arm{\textregistered} Confidential
                  Computing Architecture: From a Secure Specification to Safe Implementations},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {7},
  number       = {{OOPSLA1}},
  pages        = {376--405},
  year         = {2023},
  url          = {https://doi.org/10.1145/3586040},
  doi          = {10.1145/3586040},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/FoxSXBMPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/ChenXZCL23,
  author       = {Xue Chen and
                  Hongbo Xu and
                  Guoping Zhang and
                  Yun Chen and
                  Ruijie Li},
  title        = {Secure computation offloading assisted by intelligent reflection surface
                  for mobile edge computing network},
  journal      = {Phys. Commun.},
  volume       = {57},
  pages        = {102003},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.phycom.2023.102003},
  doi          = {10.1016/J.PHYCOM.2023.102003},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/ChenXZCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/ZhangLMC23,
  author       = {Yingzheng Zhang and
                  Jufang Li and
                  Guangchen Mu and
                  Xiaoyu Chen},
  title        = {Deep reinforcement learning enabled UAV-IRS-assisted secure mobile
                  edge computing network},
  journal      = {Phys. Commun.},
  volume       = {61},
  pages        = {102173},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.phycom.2023.102173},
  doi          = {10.1016/J.PHYCOM.2023.102173},
  timestamp    = {Sat, 20 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/ZhangLMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/DwivediAV23,
  author       = {Sanjeev Kumar Dwivedi and
                  Ruhul Amin and
                  Satyanarayana Vollala},
  title        = {Smart contract and IPFS-based trustworthy secure data storage and
                  device authentication scheme in fog computing environment},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {1},
  pages        = {1--21},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-022-01376-7},
  doi          = {10.1007/S12083-022-01376-7},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/DwivediAV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/queue/Russinovich23,
  author       = {Mark Russinovich},
  title        = {Confidential Computing: Elevating Cloud Security and Privacy: Working
                  toward a more secure and innovative future},
  journal      = {{ACM} Queue},
  volume       = {21},
  number       = {4},
  pages        = {44--48},
  year         = {2023},
  url          = {https://doi.org/10.1145/3623461},
  doi          = {10.1145/3623461},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/queue/Russinovich23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PulipetiK23,
  author       = {Srikanth Pulipeti and
                  Adarsh Kumar},
  title        = {Secure quantum computing for healthcare sector: {A} short analysis},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.293},
  doi          = {10.1002/SPY2.293},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PulipetiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/Jiang23,
  author       = {Hongwei Jiang},
  title        = {Secure Storage of Computer Network Data based on Cloud Computing},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {24},
  number       = {4},
  pages        = {663--672},
  year         = {2023},
  url          = {https://doi.org/10.12694/scpe.v24i4.2069},
  doi          = {10.12694/SCPE.V24I4.2069},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scpe/Jiang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlharbiAAE23,
  author       = {Hatem A. Alharbi and
                  Mohammad Aldossary and
                  Jaber Almutairi and
                  Ibrahim A. Elgendy},
  title        = {Energy-Aware and Secure Task Offloading for Multi-Tier Edge-Cloud
                  Computing Systems},
  journal      = {Sensors},
  volume       = {23},
  number       = {6},
  pages        = {3254},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23063254},
  doi          = {10.3390/S23063254},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/AlharbiAAE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Roy23,
  author       = {Deepsubhra Guha Roy},
  title        = {BlockEdge: {A} Privacy-Aware Secured Edge Computing Framework Using
                  Blockchain for Industry 4.0},
  journal      = {Sensors},
  volume       = {23},
  number       = {5},
  pages        = {2502},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23052502},
  doi          = {10.3390/S23052502},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/Roy23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sis/ZengKS23,
  author       = {Ying Zeng and
                  Zhongmiao Kang and
                  Zhan Shi},
  title        = {Secure Data Processing Technology of Distribution Network {OPGW} Line
                  with Edge Computing},
  journal      = {{EAI} Endorsed Trans. Scalable Inf. Syst.},
  volume       = {10},
  number       = {3},
  pages        = {e7},
  year         = {2023},
  url          = {https://doi.org/10.4108/eetsis.v10i3.2837},
  doi          = {10.4108/EETSIS.V10I3.2837},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sis/ZengKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/GuptaSSL23,
  author       = {Ishu Gupta and
                  Deepika Saxena and
                  Ashutosh Kumar Singh and
                  Chung{-}Nan Lee},
  title        = {SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced
                  Privacy Preserving Data Computing and Protection},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {4},
  pages        = {5130--5141},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3272611},
  doi          = {10.1109/JSYST.2023.3272611},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/GuptaSSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/BhattaraiP23,
  author       = {Adarsha Bhattarai and
                  Dongming Peng},
  title        = {An Integrated Secure Efficient Computing Architecture for Embedded
                  and Remote {ECG} Diagnosis},
  journal      = {{SN} Comput. Sci.},
  volume       = {4},
  number       = {1},
  pages        = {45},
  year         = {2023},
  url          = {https://doi.org/10.1007/s42979-022-01465-7},
  doi          = {10.1007/S42979-022-01465-7},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sncs/BhattaraiP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/suscom/YadavS23,
  author       = {Ashish Mohan Yadav and
                  S. C. Sharma},
  title        = {Cooperative task scheduling secured with blockchain in sustainable
                  mobile edge computing},
  journal      = {Sustain. Comput. Informatics Syst.},
  volume       = {37},
  pages        = {100843},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.suscom.2022.100843},
  doi          = {10.1016/J.SUSCOM.2022.100843},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/suscom/YadavS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ZhangCZ23,
  author       = {Ji Zhang and
                  Anmin Chen and
                  Ping Zhang},
  title        = {Provably Secure Data Access Control Protocol for Cloud Computing},
  journal      = {Symmetry},
  volume       = {15},
  number       = {12},
  pages        = {2111},
  year         = {2023},
  url          = {https://doi.org/10.3390/sym15122111},
  doi          = {10.3390/SYM15122111},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/ZhangCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/DuLLZ23,
  author       = {Wei Du and
                  Ang Li and
                  Qinghua Li and
                  Pan Zhou},
  title        = {Privacy-Preserving and Secure Cloud Computing: {A} Case of Large-Scale
                  Nonlinear Programming},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {1},
  pages        = {484--498},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3099720},
  doi          = {10.1109/TCC.2021.3099720},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/DuLLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiuHLXLYX23,
  author       = {Zewei Liu and
                  Chunqiang Hu and
                  Ruinian Li and
                  Tao Xiang and
                  Xingwang Li and
                  Jiguo Yu and
                  Hui Xia},
  title        = {A Privacy-Preserving Outsourcing Computing Scheme Based on Secure
                  Trusted Environment},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {2325--2336},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2022.3201401},
  doi          = {10.1109/TCC.2022.3201401},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/LiuHLXLYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiuZYLHLY23,
  author       = {Yao Liu and
                  Tanping Zhou and
                  Zelun Yue and
                  Wenchao Liu and
                  Yiliang Han and
                  Qi Li and
                  Xiaoyuan Yang},
  title        = {Secure and Efficient Online Fingerprint Authentication Scheme Based
                  On Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {1},
  pages        = {564--578},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2021.3103546},
  doi          = {10.1109/TCC.2021.3103546},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/LiuZYLHLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Rajsbaum23,
  author       = {Sergio Rajsbaum},
  title        = {A distributed computing perspective of unconditionally secure information
                  transmission in Russian cards problems},
  journal      = {Theor. Comput. Sci.},
  volume       = {952},
  pages        = {113761},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.tcs.2023.113761},
  doi          = {10.1016/J.TCS.2023.113761},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/Rajsbaum23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLYXL23,
  author       = {Lili Wang and
                  Ye Lin and
                  Ting Yao and
                  Hu Xiong and
                  Kaitai Liang},
  title        = {{FABRIC:} Fast and Secure Unbounded Cross-System Encrypted Data Sharing
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {5130--5142},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2023.3240820},
  doi          = {10.1109/TDSC.2023.3240820},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangLYXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SongMZXL23,
  author       = {Zishuai Song and
                  Hui Ma and
                  Rui Zhang and
                  Wenhan Xu and
                  Jianhao Li},
  title        = {Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge
                  Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2234--2249},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3266164},
  doi          = {10.1109/TIFS.2023.3266164},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SongMZXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WazidDSRG23,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Sachin Shetty and
                  Joel J. P. C. Rodrigues and
                  Mohsen Guizani},
  title        = {{AISCM-FH:} AI-Enabled Secure Communication Mechanism in Fog Computing-Based
                  Healthcare},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {319--334},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3220959},
  doi          = {10.1109/TIFS.2022.3220959},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WazidDSRG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWMLWWY23,
  author       = {Zhuangzhuang Zhang and
                  Libing Wu and
                  Chuanguo Ma and
                  Jianxin Li and
                  Jing Wang and
                  Qian Wang and
                  Shui Yu},
  title        = {{LSFL:} {A} Lightweight and Secure Federated Learning Scheme for Edge
                  Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {365--379},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2022.3221899},
  doi          = {10.1109/TIFS.2022.3221899},
  timestamp    = {Sat, 04 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWMLWWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhongWCZB23,
  author       = {Hong Zhong and
                  Li Wang and
                  Jie Cui and
                  Jing Zhang and
                  Irina Bolodurina},
  title        = {Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled
                  Vehicular Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3774--3786},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3287731},
  doi          = {10.1109/TIFS.2023.3287731},
  timestamp    = {Sat, 12 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhongWCZB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WuZBW23,
  author       = {Yirui Wu and
                  Lilai Zhang and
                  Stefano Berretti and
                  Shaohua Wan},
  title        = {Medical Image Encryption by Content-Aware {DNA} Computing for Secure
                  Healthcare},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {19},
  number       = {2},
  pages        = {2089--2098},
  year         = {2023},
  url          = {https://doi.org/10.1109/TII.2022.3194590},
  doi          = {10.1109/TII.2022.3194590},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/WuZBW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/JiangHLMZ23,
  author       = {Bingcheng Jiang and
                  Qian He and
                  Peng Liu and
                  Sabita Maharjan and
                  Yan Zhang},
  title        = {Blockchain Empowered Secure Video Sharing With Access Control for
                  Vehicular Edge Computing},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {9},
  pages        = {9041--9054},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3269058},
  doi          = {10.1109/TITS.2023.3269058},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/JiangHLMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/JuCCLPXODL23,
  author       = {Ying Ju and
                  Yuchao Chen and
                  Zhiwei Cao and
                  Lei Liu and
                  Qingqi Pei and
                  Ming Xiao and
                  Kaoru Ota and
                  Mianxiong Dong and
                  Victor C. M. Leung},
  title        = {Joint Secure Offloading and Resource Allocation for Vehicular Edge
                  Computing Network: {A} Multi-Agent Deep Reinforcement Learning Approach},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {5},
  pages        = {5555--5569},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2023.3242997},
  doi          = {10.1109/TITS.2023.3242997},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/JuCCLPXODL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tiv/LangTDZSL23,
  author       = {Ping Lang and
                  Daxin Tian and
                  Xuting Duan and
                  Jianshan Zhou and
                  Zhengguo Sheng and
                  Victor C. M. Leung},
  title        = {Blockchain-Based Cooperative Computation Offloading and Secure Handover
                  in Vehicular Edge Computing Networks},
  journal      = {{IEEE} Trans. Intell. Veh.},
  volume       = {8},
  number       = {7},
  pages        = {3839--3853},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIV.2023.3271367},
  doi          = {10.1109/TIV.2023.3271367},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tiv/LangTDZSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AsheralievaN23,
  author       = {Alia Asheralieva and
                  Dusit Niyato},
  title        = {Secure and Efficient Coded Multi-Access Edge Computing With Generalized
                  Graph Neural Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {9},
  pages        = {5504--5524},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2022.3172117},
  doi          = {10.1109/TMC.2022.3172117},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/AsheralievaN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AsheralievaNX23,
  author       = {Alia Asheralieva and
                  Dusit Niyato and
                  Zehui Xiong},
  title        = {Auction-and-Learning Based Lagrange Coded Computing Model for Privacy-Preserving,
                  Secure, and Resilient Mobile Edge Computing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {2},
  pages        = {744--764},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2021.3097380},
  doi          = {10.1109/TMC.2021.3097380},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/AsheralievaNX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiWCLL23,
  author       = {Jiaxing Li and
                  Jigang Wu and
                  Long Chen and
                  Jin Li and
                  Siew{-}Kei Lam},
  title        = {Blockchain-Based Secure Key Management for Mobile Edge Computing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {1},
  pages        = {100--114},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2021.3068717},
  doi          = {10.1109/TMC.2021.3068717},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/LiWCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LuMFGZWN23,
  author       = {Weidang Lu and
                  Yandan Mo and
                  Yunqi Feng and
                  Yuan Gao and
                  Nan Zhao and
                  Yuan Wu and
                  Arumugam Nallanathan},
  title        = {Secure Transmission for Multi-UAV-Assisted Mobile Edge Computing Based
                  on Reinforcement Learning},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {3},
  pages        = {1270--1282},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3185130},
  doi          = {10.1109/TNSE.2022.3185130},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/LuMFGZWN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/TanveerKNAE23,
  author       = {Muhammad Tanveer and
                  Abd Ullah Khan and
                  Tu N. Nguyen and
                  Musheer Ahmad and
                  Ahmed A. Abd El{-}Latif},
  title        = {Towards a Secure and Computational Framework for Internet of Drones
                  Enabled Aerial Computing},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {10},
  number       = {5},
  pages        = {3058--3070},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSE.2022.3151843},
  doi          = {10.1109/TNSE.2022.3151843},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/TanveerKNAE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/YuanHTLYCY23,
  author       = {Liang Yuan and
                  Qiang He and
                  Siyu Tan and
                  Bo Li and
                  Jiangshan Yu and
                  Feifei Chen and
                  Yun Yang},
  title        = {CoopEdge+: Enabling Decentralized, Secure and Cooperative Multi-Access
                  Edge Computing Based on Blockchain},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {34},
  number       = {3},
  pages        = {894--908},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPDS.2022.3231296},
  doi          = {10.1109/TPDS.2022.3231296},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/YuanHTLYCY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/AlDoghmanMKSTZ23,
  author       = {Firas Al{-}Doghman and
                  Nour Moustafa and
                  Ibrahim Khalil and
                  Nasrin Sohrabi and
                  Zahir Tari and
                  Albert Y. Zomaya},
  title        = {AI-Enabled Secure Microservices in Edge Computing: Opportunities and
                  Challenges},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {2},
  pages        = {1485--1504},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2022.3155447},
  doi          = {10.1109/TSC.2022.3155447},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/AlDoghmanMKSTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/HuangWC23,
  author       = {Qinlong Huang and
                  Chao Wang and
                  Lixuan Chen},
  title        = {Secure and Fine-Grained Flow Control for Subscription-Based Data Services
                  in Cloud-Edge Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {3},
  pages        = {2165--2177},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2022.3203378},
  doi          = {10.1109/TSC.2022.3203378},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/HuangWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/LiYFP23,
  author       = {Hongjun Li and
                  Jia Yu and
                  Jianxi Fan and
                  Yihai Pi},
  title        = {{DSOS:} {A} Distributed Secure Outsourcing System for Edge Computing
                  Service in IoT},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {53},
  number       = {1},
  pages        = {238--250},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSMC.2022.3179345},
  doi          = {10.1109/TSMC.2022.3179345},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/LiYFP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/ChenWZLTD23,
  author       = {Zhuojun Chen and
                  Ming Wu and
                  Yifeng Zhou and
                  Renlong Li and
                  Jinzhe Tan and
                  Ding Ding},
  title        = {{PUF-CIM:} SRAM-Based Compute-In-Memory With Zero Bit-Error-Rate Physical
                  Unclonable Function for Lightweight Secure Edge Computing},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {31},
  number       = {8},
  pages        = {1234--1247},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVLSI.2023.3277517},
  doi          = {10.1109/TVLSI.2023.3277517},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/ChenWZLTD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangSZMZ23,
  author       = {Peng Wang and
                  Wen Sun and
                  Haibin Zhang and
                  Wenqiang Ma and
                  Yan Zhang},
  title        = {Distributed and Secure Federated Learning for Wireless Computing Power
                  Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {7},
  pages        = {9381--9393},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3247859},
  doi          = {10.1109/TVT.2023.3247859},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WangSZMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WuSGL23,
  author       = {Mengru Wu and
                  Qingyang Song and
                  Lei Guo and
                  Inkyu Lee},
  title        = {Energy-Efficient Secure Computation Offloading in Wireless Powered
                  Mobile Edge Computing Systems},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {5},
  pages        = {6907--6912},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3236327},
  doi          = {10.1109/TVT.2023.3236327},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WuSGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/XieCAPLH23,
  author       = {Zhan Xie and
                  Yong Chen and
                  Ikram Ali and
                  Chengwei Pan and
                  Fagen Li and
                  Wen He},
  title        = {Efficient and Secure Certificateless Signcryption Without Pairing
                  for Edge Computing-Based Internet of Vehicles},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {5},
  pages        = {5642--5653},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3230442},
  doi          = {10.1109/TVT.2022.3230442},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/XieCAPLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/ChenLKSLG23,
  author       = {Chien{-}Ming Chen and
                  Zhen Li and
                  Saru Kumari and
                  Gautam Srivastava and
                  Kuruva Lakshmanna and
                  Thippa Reddy Gadekallu},
  title        = {A provably secure key transfer protocol for the fog-enabled Social
                  Internet of Vehicles based on a confidential computing environment},
  journal      = {Veh. Commun.},
  volume       = {39},
  pages        = {100567},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.vehcom.2022.100567},
  doi          = {10.1016/J.VEHCOM.2022.100567},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/ChenLKSLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wias/ReddyK23,
  author       = {G. Narendrababu Reddy and
                  S. Phani Kumar},
  title        = {Multi-objective secure aware workflow scheduling algorithm in cloud
                  computing based on hybrid optimization algorithm},
  journal      = {Web Intell.},
  volume       = {21},
  number       = {4},
  pages        = {385--405},
  year         = {2023},
  url          = {https://doi.org/10.3233/WEB-220094},
  doi          = {10.3233/WEB-220094},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wias/ReddyK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/KavuriS23,
  author       = {Satheesh K. S. V. A. Kavuri and
                  T. Krishna Sree},
  title        = {Enhancing Security Using Secure Authentication Model in Fog Computing
                  Model},
  journal      = {Wirel. Pers. Commun.},
  volume       = {130},
  number       = {2},
  pages        = {909--933},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10313-7},
  doi          = {10.1007/S11277-023-10313-7},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/KavuriS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/PadmaS23,
  author       = {P. Padma and
                  S. Srinivasan},
  title        = {DAuth - Delegated Authorization Framework for Secured Serverless Cloud
                  Computing},
  journal      = {Wirel. Pers. Commun.},
  volume       = {129},
  number       = {3},
  pages        = {1563--1583},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11277-023-10189-7},
  doi          = {10.1007/S11277-023-10189-7},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/PadmaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/ZhouDBZHK23,
  author       = {Naweiluo Zhou and
                  Florent Dufour and
                  Vinzent Bode and
                  Peter Zinterhof and
                  Nicolay J. Hammer and
                  Dieter Kranzlm{\"{u}}ller},
  title        = {Towards Confidential Computing: {A} Secure Cloud Architecture for
                  Big Data Analytics and {AI}},
  booktitle    = {16th {IEEE} International Conference on Cloud Computing, {CLOUD} 2023,
                  Chicago, IL, USA, July 2-8, 2023},
  pages        = {293--295},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CLOUD60044.2023.00042},
  doi          = {10.1109/CLOUD60044.2023.00042},
  timestamp    = {Fri, 29 Sep 2023 13:28:51 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/ZhouDBZHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenWLS23,
  author       = {Chunlu Chen and
                  Kevin I{-}Kai Wang and
                  Peng Li and
                  Kouichi Sakurai},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {{POSTER:} Advancing Federated Edge Computing with Continual Learning
                  for Secure and Efficient Performance},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {685--689},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_40},
  doi          = {10.1007/978-3-031-41181-6\_40},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChenWLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aiml2/NairRN23,
  author       = {Renju C. Nair and
                  Madhav Rao and
                  Muralidhara V. N},
  title        = {SecureFrameNet: {A} rich computing capable secure framework for deploying
                  neural network models on edge protected system},
  booktitle    = {Proceedings of the Third International Conference on {AI-ML} Systems,
                  AIMLSystems 2023, Bangalore, India, October 25-28, 2023},
  pages        = {8:1--8:13},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3639856.3639864},
  doi          = {10.1145/3639856.3639864},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aiml2/NairRN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asss/HosenSPRC23,
  author       = {A. S. M. Sanwar Hosen and
                  Pradip Kumar Sharma and
                  Deepak Puthal and
                  In{-}Ho Ra and
                  Gi Hwan Cho},
  title        = {SECBlock-IIoT: {A} Secure Blockchain-enabled Edge Computing Framework
                  for Industrial Internet of Things},
  booktitle    = {Proceedings of the Third International Symposium on Advanced Security
                  on Software and Systems, {ASSS} 2023, Melbourne, VIC, Australia, July
                  10-14, 2023},
  pages        = {1:1--1:14},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591365.3592945},
  doi          = {10.1145/3591365.3592945},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asss/HosenSPRC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdsic/LinTTC23,
  author       = {Han{-}Yu Lin and
                  Tung{-}Tso Tsai and
                  Pei{-}Yih Ting and
                  Po{-}Cheng Chan},
  title        = {{CL-SML:} Secure Certificateless Signature with Message Linkages for
                  IoT-Based Fog Computing Environments},
  booktitle    = {Proceedings of the 5th International Conference on Big-data Service
                  and Intelligent Computation, {BDSIC} 2023, Singapore, October 20-22,
                  2023},
  pages        = {9--15},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3633624.3633626},
  doi          = {10.1145/3633624.3633626},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bdsic/LinTTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/Qiu023,
  author       = {Houming Qiu and
                  Kun Zhu},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Nikolaos S. Voros},
  title        = {Secure and Private Approximated Coded Distributed Computing Using
                  Elliptic Curve Cryptography},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 19th {EAI} International Conference, CollaborateCom 2023, Corfu
                  Island, Greece, October 4-6, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {562},
  pages        = {357--374},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-54528-3\_20},
  doi          = {10.1007/978-3-031-54528-3\_20},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/Qiu023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpsweek/GungorRA23,
  author       = {Onat G{\"{u}}ng{\"{o}}r and
                  Tajana Rosing and
                  Baris Aksanli},
  title        = {Adversarial-HD: Hyperdimensional Computing Adversarial Attack Design
                  for Secure Industrial Internet of Things},
  booktitle    = {Proceedings of Cyber-Physical Systems and Internet of Things Week
                  2023, CPS-IoT Week 2023 Workshops, San Antonio, TX, USA, May 9-12,
                  2023},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576914.3587484},
  doi          = {10.1145/3576914.3587484},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpsweek/GungorRA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/YuZAGAR23,
  author       = {Xiaofan Yu and
                  Minxuan Zhou and
                  Fatemeh Asgarinejad and
                  Onat G{\"{u}}ng{\"{o}}r and
                  Baris Aksanli and
                  Tajana Rosing},
  title        = {Lightning Talk: Private and Secure Edge {AI} with Hyperdimensional
                  Computing},
  booktitle    = {60th {ACM/IEEE} Design Automation Conference, {DAC} 2023, San Francisco,
                  CA, USA, July 9-13, 2023},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DAC56929.2023.10247820},
  doi          = {10.1109/DAC56929.2023.10247820},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/YuZAGAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/BouamamaBO23,
  author       = {Jaouhara Bouamama and
                  Yahya Benkaouz and
                  Mohammed Ouzzif},
  title        = {EdgeSA: Secure Aggregation for Privacy-Preserving Federated Learning
                  in Edge Computing},
  booktitle    = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates,
                  November 14-17, 2023},
  pages        = {375--382},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023.10361333},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023.10361333},
  timestamp    = {Tue, 23 Jan 2024 20:30:56 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/BouamamaBO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dessert/BorgesAOD23,
  author       = {Jos{\'{e}} Borges and
                  Mirataei Alireza and
                  Haidukevych Oleksandra and
                  Nikolaos Doukas},
  title        = {A Secure Cloud Computing Method for Rapid Implementation of Cryptographic
                  Data Protection in IoT},
  booktitle    = {13th International Conference on Dependable Systems, Services and
                  Technologies, {DESSERT} 2023, Athens, Greece, October 13-15, 2023},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DESSERT61349.2023.10416477},
  doi          = {10.1109/DESSERT61349.2023.10416477},
  timestamp    = {Sat, 24 Feb 2024 20:42:46 +0100},
  biburl       = {https://dblp.org/rec/conf/dessert/BorgesAOD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficta/SurendranTJPWJ23,
  author       = {Priyanka Surendran and
                  Bindhya Thomas and
                  Densy John and
                  Anupama Prasanth and
                  Joy Winston and
                  AbdulKhadar Jilani},
  editor       = {Vikrant Bhateja and
                  Fiona Carroll and
                  Jo{\~{a}}o Manuel R. S. Tavares and
                  Sandeep Singh Sengar and
                  Peter Peer},
  title        = {Authentication Protocol for Secure Data Access in Fog Computing-Based
                  Internet of Things},
  booktitle    = {Intelligent Data Engineering and Analytics - Proceedings of the 11th
                  International Conference on Frontiers of Intelligent Computing: Theory
                  and Applications {(FICTA} 2023), Cardiff, UK, 11-12 April 2023},
  series       = {Smart Innovation, Systems and Technologies},
  volume       = {371},
  pages        = {481--494},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-6706-3\_41},
  doi          = {10.1007/978-981-99-6706-3\_41},
  timestamp    = {Sun, 04 Aug 2024 19:42:19 +0200},
  biburl       = {https://dblp.org/rec/conf/ficta/SurendranTJPWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/AarellaMKP23,
  author       = {Seema G. Aarella and
                  Saraju P. Mohanty and
                  Elias Kougianos and
                  Deepak Puthal},
  editor       = {Himanshu Thapliyal and
                  Ronald F. DeMara and
                  Inna Partin{-}Vaisband and
                  Srinivas Katkoori},
  title        = {Fortified-Edge: Secure {PUF} Certificate Authentication Mechanism
                  for Edge Data Centers in Collaborative Edge Computing},
  booktitle    = {Proceedings of the Great Lakes Symposium on {VLSI} 2023, {GLSVLSI}
                  2023, Knoxville, TN, USA, June 5-7, 2023},
  pages        = {249--254},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3583781.3590249},
  doi          = {10.1145/3583781.3590249},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/AarellaMKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaice/LiuZT23,
  author       = {Guoying Liu and
                  Xu Zeng and
                  Zhifeng Tian},
  title        = {Terminal-Cloud Computing Power Collaboration Secure Surveillance System
                  in Indoor Environments},
  booktitle    = {Proceedings of the 4th International Conference on Artificial Intelligence
                  and Computer Engineering, {ICAICE} 2023, Dalian, China, November 17-19,
                  2023},
  pages        = {892--896},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3652628.3652777},
  doi          = {10.1145/3652628.3652777},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaice/LiuZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SinghKH23,
  author       = {Parminder Singh and
                  Avinash Kaur and
                  Mustapha Hedabou},
  title        = {Blockchain and Dew Computing-based Model for Secure Energy Trading
                  in Smart Grids},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2023 - Workshops,
                  Rome, Italy, May 28 - June 1, 2023},
  pages        = {176--181},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCWorkshops57953.2023.10283767},
  doi          = {10.1109/ICCWORKSHOPS57953.2023.10283767},
  timestamp    = {Thu, 02 Nov 2023 17:09:45 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/SinghKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/QinNWXL23,
  author       = {Xiaofei Qin and
                  Zhenyu Na and
                  Xu Wu and
                  Mudi Xiong and
                  Bin Lin},
  title        = {Secure Mobile Edge Computing for Integrated {HAP} and {UAV} Networks},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2023, Dalian, China, August 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCC57788.2023.10233325},
  doi          = {10.1109/ICCC57788.2023.10233325},
  timestamp    = {Wed, 13 Sep 2023 08:43:35 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/QinNWXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/WangZL23,
  author       = {Ying Wang and
                  Yi Zheng and
                  Jiahui Liu},
  title        = {Secure Task Offloading and Resource Scheduling in Maritime Edge Computing
                  Systems},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2023, Dalian, China, August 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCC57788.2023.10233531},
  doi          = {10.1109/ICCC57788.2023.10233531},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/WangZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/WuCLQ23,
  author       = {Mengru Wu and
                  Weijin Chen and
                  Kexin Li and
                  Li Ping Qian},
  title        = {Secure Computation Offloading for IRS-Assisted Mobile Edge Computing
                  Networks},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2023, Dalian, China, August 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCC57788.2023.10233499},
  doi          = {10.1109/ICCC57788.2023.10233499},
  timestamp    = {Sat, 20 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/WuCLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/NaazJS23,
  author       = {Zaineb Naaz and
                  Gamini Joshi and
                  Vidushi Sharma},
  title        = {Secure and Efficient Edge Computing Framework For IoT},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10307200},
  doi          = {10.1109/ICCCNT56998.2023.10307200},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccnt/NaazJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/SharmaM23,
  author       = {Rohan Sharma and
                  Swapna Mele Pottaraikkal},
  title        = {Unified Multi-Layered Model To Secure Computing Environments Against
                  Cryptomining Malware},
  booktitle    = {14th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2023, Delhi, India, July 6-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCCNT56998.2023.10306578},
  doi          = {10.1109/ICCCNT56998.2023.10306578},
  timestamp    = {Mon, 25 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/SharmaM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/MallahLH23,
  author       = {Ranwa Al Mallah and
                  David L{\'{o}}pez and
                  Talal Halabi},
  title        = {Blockchain-enabled Efficient and Secure Federated Learning in IoT
                  and Edge Computing Networks},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2023, Honolulu, HI, USA, February 20-22, 2023},
  pages        = {511--515},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICNC57223.2023.10074277},
  doi          = {10.1109/ICNC57223.2023.10074277},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/MallahLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsie/Li23,
  author       = {Wen Li},
  title        = {Trustless Layer for Secure Fog Computing},
  booktitle    = {Proceedings of the 8th International Conference on Cyber Security
                  and Information Engineering, {ICCSIE} 2023, Putrajaya, Malaysia, September
                  22-24, 2023},
  pages        = {328--334},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3617184.3630157},
  doi          = {10.1145/3617184.3630157},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsie/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icct/WuJ0G23,
  author       = {Jian Wu and
                  Min Jia and
                  Qing Guo and
                  Xuemai Gu},
  title        = {Joint Optimization of Computation Offloading and Power Allocation
                  Based on {DRL} in Secure {LEO} Satellite Edge Computing System},
  booktitle    = {23rd {IEEE} International Conference on Communication Technology,
                  {ICCT} 2023, Wuxi, China, October 20-22, 2023},
  pages        = {1668--1671},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCT59356.2023.10419561},
  doi          = {10.1109/ICCT59356.2023.10419561},
  timestamp    = {Wed, 28 Feb 2024 16:50:10 +0100},
  biburl       = {https://dblp.org/rec/conf/icct/WuJ0G23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icimmi/Sethi0G23,
  author       = {Inderjeet Singh Sethi and
                  Manish Shrivastava and
                  Dinesh Goyal},
  editor       = {Dinesh Goyal and
                  Anil Kumar and
                  Dharm Singh and
                  Marcin Paprzycki and
                  Pooja Jain and
                  B. B. Gupta and
                  Uday Pratap Singh},
  title        = {Implementation of cloud computing towards Secure Online Auction for
                  sustainable future of business},
  booktitle    = {Proceedings of the 5th International Conference on Information Management
                  {\&} Machine Intelligence, Jaipur, India, November 23-25, 2023},
  pages        = {124:1--124:6},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3647444.3647951},
  doi          = {10.1145/3647444.3647951},
  timestamp    = {Fri, 17 May 2024 16:58:38 +0200},
  biburl       = {https://dblp.org/rec/conf/icimmi/Sethi0G23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SethiAB23,
  author       = {Kamalakanta Sethi and
                  Aniket Agrawal and
                  Padmalochan Bera},
  editor       = {Vallipuram Muthukkumarasamy and
                  Sithu D. Sudarsan and
                  Rudrapatna K. Shyamasundar},
  title        = {Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain
                  Technology},
  booktitle    = {Information Systems Security - 19th International Conference, {ICISS}
                  2023, Raipur, India, December 16-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {431--448},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49099-6\_26},
  doi          = {10.1007/978-3-031-49099-6\_26},
  timestamp    = {Thu, 04 Jan 2024 08:13:46 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SethiAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icit2/ZhouSMH23,
  author       = {Yuan Zhou and
                  Haijian Sun and
                  Xiang Ma and
                  Rose Qingyang Hu},
  title        = {Energy-Efficient Secure Offloading for NOMA-Enabled Machine-type Mobile-Edge
                  Computing},
  booktitle    = {{IEEE} International Conference on Industrial Technology, {ICIT} 2023,
                  Orlando, FL, USA, April 4-6, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICIT58465.2023.10143151},
  doi          = {10.1109/ICIT58465.2023.10143151},
  timestamp    = {Fri, 23 Jun 2023 22:32:18 +0200},
  biburl       = {https://dblp.org/rec/conf/icit2/ZhouSMH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmip/LiL23,
  author       = {Sijie Li and
                  Xiehua Li},
  title        = {Secure Image Retrieval Based on Deep Learning in Cloud Computing},
  booktitle    = {Proceedings of the 2023 8th International Conference on Multimedia
                  and Image Processing, {ICMIP} 2023, Tianjin, China, April 21-23, 2023},
  pages        = {40--46},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3599589.3599596},
  doi          = {10.1145/3599589.3599596},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icmip/LiL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/JiangZTXZD23,
  author       = {Xutong Jiang and
                  Guoming Zhang and
                  Hao Tian and
                  Haolong Xiang and
                  Xuyun Zhang and
                  Wanchun Dou},
  title        = {A Blockchain-enabled Secure Access Management Method in Edge Computing},
  booktitle    = {29th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2023, Ocean Flower Island, China, December 17-21, 2023},
  pages        = {2596--2603},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICPADS60453.2023.00345},
  doi          = {10.1109/ICPADS60453.2023.00345},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icpads/JiangZTXZD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icphys/JiaN23,
  author       = {Jing Jia and
                  Hiroaki Nishi},
  title        = {Differential Privacy Framework using Secure Computing on Untrusted
                  Servers},
  booktitle    = {6th {IEEE} International Conference on Industrial Cyber-Physical Systems,
                  {ICPS} 2023, Wuhan, China, May 8-11, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICPS58381.2023.10128028},
  doi          = {10.1109/ICPS58381.2023.10128028},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icphys/JiaN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifipiot/Nithin23,
  author       = {G. Naga Nithin},
  editor       = {Deepak Puthal and
                  Saraju P. Mohanty and
                  Baek{-}Young Choi},
  title        = {An Efficient and Secure Mechanism for Ubiquitous Sustainable Computing
                  System},
  booktitle    = {Internet of Things. Advances in Information and Communication Technology
                  - 6th {IFIP} International Cross-Domain Conference, IFIPIoT 2023,
                  Denton, TX, USA, November 2-3, 2023, Proceedings, Part {II}},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {684},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45882-8\_12},
  doi          = {10.1007/978-3-031-45882-8\_12},
  timestamp    = {Tue, 30 Jan 2024 10:11:54 +0100},
  biburl       = {https://dblp.org/rec/conf/ifipiot/Nithin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/BenMbarakNE23,
  author       = {Omessead BenMbarak and
                  Anis Naanaa and
                  Sadok ElAsmi},
  title        = {New secure access control model for cloud computing based on Chaotic
                  systems},
  booktitle    = {International Wireless Communications and Mobile Computing, {IWCMC}
                  2023, Marrakesh, Morocco, June 19-23, 2023},
  pages        = {1485--1490},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IWCMC58020.2023.10183120},
  doi          = {10.1109/IWCMC58020.2023.10183120},
  timestamp    = {Thu, 27 Jul 2023 08:33:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/BenMbarakNE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paap/LuCFLL23,
  author       = {Zhixun Lu and
                  Yanfeng Chen and
                  Qihua Feng and
                  Jing Liang and
                  Peiya Li},
  title        = {End-to-End Secure Image Retrieval via Self-Supervised Learning in
                  Cloud Computing},
  booktitle    = {14th {IEEE} International Symposium on Parallel Architectures, Algorithms
                  and Programming, {PAAP} 2023, Beijing, China, November 24-26, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PAAP60200.2023.10391596},
  doi          = {10.1109/PAAP60200.2023.10391596},
  timestamp    = {Tue, 13 Feb 2024 08:58:01 +0100},
  biburl       = {https://dblp.org/rec/conf/paap/LuCFLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/profes/DUrbanoCC23,
  author       = {Andrea D'Urbano and
                  Christian Catalano and
                  Angelo Corallo},
  editor       = {Regine Kadgien and
                  Andreas Jedlitschka and
                  Andrea Janes and
                  Valentina Lenarduzzi and
                  Xiaozhou Li},
  title        = {A Perspective on the Interplay Between 5G and Quantum Computing for
                  Secure Algorithm and Software Engineering},
  booktitle    = {Product-Focused Software Process Improvement - 24th International
                  Conference, {PROFES} 2023, Dornbirn, Austria, December 10-13, 2023,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14484},
  pages        = {89--96},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49269-3\_9},
  doi          = {10.1007/978-3-031-49269-3\_9},
  timestamp    = {Sat, 09 Dec 2023 19:23:44 +0100},
  biburl       = {https://dblp.org/rec/conf/profes/DUrbanoCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/KornarosBG23,
  author       = {George Kornaros and
                  Georgia Berki and
                  Miltos D. Grammatikakis},
  editor       = {Norbert Meyer and
                  Anna Grocholewska{-}Czurylo},
  title        = {Quantum-Secure Communication for Trusted Edge Computing with IoT Devices},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 38th {IFIP} {TC} 11
                  International Conference, {SEC} 2023, Poznan, Poland, June 14-16,
                  2023, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {679},
  pages        = {163--176},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56326-3\_12},
  doi          = {10.1007/978-3-031-56326-3\_12},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/KornarosBG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcomp/CicconettiCLNPPS23,
  author       = {Claudio Cicconetti and
                  Marco Conti and
                  Eufemia Lella and
                  Pietro Noviello and
                  Gennaro Davide Paduanelli and
                  Andrea Passarella and
                  Elisabetta Storelli},
  title        = {A Prototype for QKD-secure Serverless Computing with {ETSI} {MEC}},
  booktitle    = {2023 {IEEE} International Conference on Smart Computing, {SMARTCOMP}
                  2023, Nashville, TN, USA, June 26-30, 2023},
  pages        = {189--190},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SMARTCOMP58114.2023.00043},
  doi          = {10.1109/SMARTCOMP58114.2023.00043},
  timestamp    = {Tue, 15 Aug 2023 09:17:51 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcomp/CicconettiCLNPPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/WangFYLCL23,
  author       = {Jingjing Wang and
                  Hao Feng and
                  Zheng Yu and
                  Rongtao Liao and
                  Shi Chen and
                  Ting Liang},
  editor       = {Budi Arief and
                  Anna Monreale and
                  Michael Sirivianos and
                  Shujun Li},
  title        = {Secure and Efficient Data Processing for Cloud Computing with Fine-Grained
                  Access Control},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 9th International
                  Symposium, SocialSec 2023, Canterbury, UK, August 14-16, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14097},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-5177-2\_11},
  doi          = {10.1007/978-981-99-5177-2\_11},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/WangFYLCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wicon/FuLYYPSF23,
  author       = {Jinrong Fu and
                  Yiwen Liu and
                  Haobo Yan and
                  Yahui Yang and
                  Ling Peng and
                  Yuanquan Shi and
                  Tao Feng},
  editor       = {Leandros A. Maglaras and
                  Christos Douligeris},
  title        = {Research on Highly Secure Metaverse Based on Extended Reality Under
                  Edge Computing},
  booktitle    = {Wireless Internet - 16th {EAI} International Conference, WiCON 2023,
                  Athens, Greece, December 15-16, 2023, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {527},
  pages        = {173--186},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-58053-6\_12},
  doi          = {10.1007/978-3-031-58053-6\_12},
  timestamp    = {Fri, 24 May 2024 16:16:17 +0200},
  biburl       = {https://dblp.org/rec/conf/wicon/FuLYYPSF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/23/PatilPBKKR23,
  author       = {Rachana Yogesh Patil and
                  Yogesh H. Patil and
                  Aparna Bannore and
                  Arijit Karati and
                  Renu Kachhoriya and
                  Manjiri Ranjanikar},
  editor       = {Kevin Daimi and
                  Abeer Alsadoon and
                  Cathryn Peoples and
                  Nour El Madhoun},
  title        = {A Provably Secure Data Sharing Scheme for Smart Gas Grid in Fog Computing
                  Environment},
  booktitle    = {Emerging Trends in Cybersecurity Applications},
  pages        = {277--299},
  publisher    = {Springer International Publishing},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-09640-2\_13},
  doi          = {10.1007/978-3-031-09640-2\_13},
  timestamp    = {Wed, 04 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/23/PatilPBKKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2023,
  title        = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2023, Abu Dhabi, United Arab Emirates,
                  November 14-17, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy59711.2023},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CY59711.2023},
  isbn         = {979-8-3503-0460-2},
  timestamp    = {Tue, 23 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/desec/2023,
  title        = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2023,
                  Tampa, FL, USA, November 7-9, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/DSC61021.2023},
  doi          = {10.1109/DSC61021.2023},
  isbn         = {979-8-3503-8211-2},
  timestamp    = {Tue, 23 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ladc/2023,
  title        = {12th Latin-American Symposium on Dependable and Secure Computing,
                  {LADC} 2023, La Paz, Bolivia, October 16-18, 2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3615366},
  doi          = {10.1145/3615366},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ladc/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09913,
  author       = {Tayyebeh Jahani{-}Nezhad and
                  Mohammad Ali Maddah{-}Ali and
                  Giuseppe Caire},
  title        = {Byzantine-Resistant Secure Aggregation for Federated Learning Based
                  on Coded Computing and Vector Commitment},
  journal      = {CoRR},
  volume       = {abs/2302.09913},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09913},
  doi          = {10.48550/ARXIV.2302.09913},
  eprinttype    = {arXiv},
  eprint       = {2302.09913},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09913.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-13258,
  author       = {Rongxin Xu and
                  Shiva Raj Pokhrel and
                  Qiujun Lan and
                  Gang Li},
  title        = {Post Quantum Secure Blockchain-based Federated Learning for Mobile
                  Edge Computing},
  journal      = {CoRR},
  volume       = {abs/2302.13258},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.13258},
  doi          = {10.48550/ARXIV.2302.13258},
  eprinttype    = {arXiv},
  eprint       = {2302.13258},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-13258.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-13727,
  author       = {Ervin Moore and
                  Ahmed Imteaj and
                  Shabnam Rezapour and
                  M. Hadi Amini},
  title        = {A Survey on Secure and Private Federated Learning Using Blockchain:
                  Theory and Application in Resource-constrained Computing},
  journal      = {CoRR},
  volume       = {abs/2303.13727},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.13727},
  doi          = {10.48550/ARXIV.2303.13727},
  eprinttype    = {arXiv},
  eprint       = {2303.13727},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-13727.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-17761,
  author       = {Naweiluo Zhou and
                  Florent Dufour and
                  Vinzent Bode and
                  Peter Zinterhof and
                  Nicolay J. Hammer and
                  Dieter Kranzlm{\"{u}}ller},
  title        = {Towards Confidential Computing: {A} Secure Cloud Architecture for
                  Big Data Analytics and {AI}},
  journal      = {CoRR},
  volume       = {abs/2305.17761},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.17761},
  doi          = {10.48550/ARXIV.2305.17761},
  eprinttype    = {arXiv},
  eprint       = {2305.17761},
  timestamp    = {Wed, 07 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-17761.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-04564,
  author       = {Ivan Damg{\aa}rd and
                  Hannah Keller and
                  Boel Nelson and
                  Claudio Orlandi and
                  Rasmus Pagh},
  title        = {Differentially Private Selection from Secure Distributed Computing},
  journal      = {CoRR},
  volume       = {abs/2306.04564},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.04564},
  doi          = {10.48550/ARXIV.2306.04564},
  eprinttype    = {arXiv},
  eprint       = {2306.04564},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-04564.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-00623,
  author       = {Patrick McDaniel and
                  Farinaz Koushanfar},
  title        = {Secure and Trustworthy Computing 2.0 Vision Statement},
  journal      = {CoRR},
  volume       = {abs/2308.00623},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.00623},
  doi          = {10.48550/ARXIV.2308.00623},
  eprinttype    = {arXiv},
  eprint       = {2308.00623},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-00623.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-12624,
  author       = {Chenxingyu Zhao and
                  Yulin Sun and
                  Ying Xiong and
                  Arvind Krishnamurthy},
  title        = {Quark: {A} High-Performance Secure Container Runtime for Serverless
                  Computing},
  journal      = {CoRR},
  volume       = {abs/2309.12624},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.12624},
  doi          = {10.48550/ARXIV.2309.12624},
  eprinttype    = {arXiv},
  eprint       = {2309.12624},
  timestamp    = {Mon, 16 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-12624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-08701,
  author       = {Trung{-}Hieu Hoang and
                  Jordan D. Fuhrman and
                  Ravi K. Madduri and
                  Miao Li and
                  Pranshu Chaturvedi and
                  Zilinghan Li and
                  Kibaek Kim and
                  Minseok Ryu and
                  Ryan Chard and
                  Eliu A. Huerta and
                  Maryellen L. Giger},
  title        = {Enabling End-to-End Secure Federated Learning in Biomedical Research
                  on Heterogeneous Computing Environments with APPFLx},
  journal      = {CoRR},
  volume       = {abs/2312.08701},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.08701},
  doi          = {10.48550/ARXIV.2312.08701},
  eprinttype    = {arXiv},
  eprint       = {2312.08701},
  timestamp    = {Tue, 06 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-08701.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DamgardKNOP23,
  author       = {Ivan Damg{\aa}rd and
                  Hannah Keller and
                  Boel Nelson and
                  Claudio Orlandi and
                  Rasmus Pagh},
  title        = {Differentially Private Selection from Secure Distributed Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {894},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/894},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DamgardKNOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Stapf22,
  author       = {Emmanuel Stapf},
  title        = {System Architecture Designs for Secure, Flexible and Openly-Accessible
                  Enclave Computing},
  school       = {Technical University of Darmstadt, Germany},
  year         = {2022},
  url          = {http://tuprints.ulb.tu-darmstadt.de/21487/},
  urn          = {urn:nbn:de:tuda-tuprints-214879},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Stapf22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Madi22,
  author       = {Abbass Madi},
  title        = {Secure Machine Learning by means of Homomorphic Encryption and Verifiable
                  Computing. (Apprentissage machine s{\'{e}}curis{\'{e}} {\`{a}}
                  l'aide de chiffrement homomorphe et de calcul v{\'{e}}rifiable)},
  school       = {University of Paris-Saclay, France},
  year         = {2022},
  url          = {https://tel.archives-ouvertes.fr/tel-03629984},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Madi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AhmedAIAAH22,
  author       = {Adeel Ahmed and
                  Saima Abdullah and
                  Saman Iftikhar and
                  Israr Ahmad and
                  Siddiqa Ajmal and
                  Qamar Hussain},
  title        = {A Novel Blockchain Based Secured and QoS Aware IoT Vehicular Network
                  in Edge Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {77707--77722},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3192111},
  doi          = {10.1109/ACCESS.2022.3192111},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AhmedAIAAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/IwamuraK22a,
  author       = {Keiichi Iwamura and
                  Ahmad Akmal Aminuddin Mohd Kamal},
  title        = {TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing
                  With a Single Computing Server},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {120503--120513},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3222312},
  doi          = {10.1109/ACCESS.2022.3222312},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/IwamuraK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KimLOKPPP22,
  author       = {MyeongHyun Kim and
                  JoonYoung Lee and
                  Ji{-}Hyeon Oh and
                  Deok Kyu Kwon and
                  Kisung Park and
                  Youngho Park and
                  Kil{-}Houm Park},
  title        = {A Secure Batch Authentication Scheme for Multiaccess Edge Computing
                  in 5G-Enabled Intelligent Transportation System},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {96224--96238},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3205001},
  doi          = {10.1109/ACCESS.2022.3205001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KimLOKPPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MichailidisMSVS22,
  author       = {Emmanouel T. Michailidis and
                  Konstantinos Maliatsos and
                  Dimitrios N. Skoutas and
                  Demosthenes Vouyioukas and
                  Charalabos Skianis},
  title        = {Secure UAV-Aided Mobile Edge Computing for IoT: {A} Review},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {86353--86383},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3199408},
  doi          = {10.1109/ACCESS.2022.3199408},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MichailidisMSVS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/array/BrennaSJJ22,
  author       = {Lars Brenna and
                  Isak Sunde Singh and
                  H{\aa}vard Dagenborg Johansen and
                  Dag Johansen},
  title        = {TFHE-rs: {A} library for safe and secure remote computing using fully
                  homomorphic encryption and trusted execution environments},
  journal      = {Array},
  volume       = {13},
  pages        = {100118},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.array.2021.100118},
  doi          = {10.1016/J.ARRAY.2021.100118},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/array/BrennaSJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/JabbarpourSSZ22,
  author       = {Mohammad Reza Jabbarpour and
                  Sheyda SeyedFarshi and
                  Mehdi Sookhak and
                  Albert Y. Zomaya},
  title        = {Proposing a Secure Self-Fining Vehicle Using Blockchain and Vehicular
                  Edge Computing},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {11},
  number       = {2},
  pages        = {28--35},
  year         = {2022},
  url          = {https://doi.org/10.1109/MCE.2020.3038029},
  doi          = {10.1109/MCE.2020.3038029},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/JabbarpourSSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/SedjelmaciSAB22,
  author       = {Hichem Sedjelmaci and
                  Sidi{-}Mohammed Senouci and
                  Nirwan Ansari and
                  Abdelwahab Boualouache},
  title        = {A Trusted Hybrid Learning Approach to Secure Edge Computing},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {11},
  number       = {3},
  pages        = {30--37},
  year         = {2022},
  url          = {https://doi.org/10.1109/MCE.2021.3099634},
  doi          = {10.1109/MCE.2021.3099634},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/SedjelmaciSAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/YangT22,
  author       = {Wu Yang and
                  Himanshu Thapliyal},
  title        = {Approximate Adiabatic Logic for Low-Power and Secure Edge Computing},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {11},
  number       = {1},
  pages        = {88--94},
  year         = {2022},
  url          = {https://doi.org/10.1109/MCE.2021.3053908},
  doi          = {10.1109/MCE.2021.3053908},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cem/YangT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/PengCL22,
  author       = {Bo Peng and
                  Mingmin Chi and
                  Chao Liu},
  title        = {Non-IID federated learning via random exchange of local feature maps
                  for textile IIoT secure computing},
  journal      = {Sci. China Inf. Sci.},
  volume       = {65},
  number       = {7},
  pages        = {1--16},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11432-021-3423-9},
  doi          = {10.1007/S11432-021-3423-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/PengCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/AliLBR22,
  author       = {Hafiz Munsub Ali and
                  Jun Liu and
                  Syed Ahmad Chan Bukhari and
                  Hafiz Tayyab Rauf},
  title        = {Planning a secure and reliable IoT-enabled FOG-assisted computing
                  infrastructure for healthcare},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {3},
  pages        = {2143--2161},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-021-03389-y},
  doi          = {10.1007/S10586-021-03389-Y},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/AliLBR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SaidiNA22,
  author       = {Ahmed Saidi and
                  Omar Nouali and
                  Abdelouahab Amira},
  title        = {{SHARE-ABE:} an efficient and secure data sharing framework based
                  on ciphertext-policy attribute-based encryption and Fog computing},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {1},
  pages        = {167--185},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-021-03382-5},
  doi          = {10.1007/S10586-021-03382-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/SaidiNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/WuSLY22,
  author       = {Zhiwei Wu and
                  Runhua Shi and
                  Kunchang Li and
                  Yifan Yang},
  title        = {Attribute-based data access control scheme with secure revocation
                  in fog computing for smart grid},
  journal      = {Clust. Comput.},
  volume       = {25},
  number       = {6},
  pages        = {3899--3913},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10586-022-03616-0},
  doi          = {10.1007/S10586-022-03616-0},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/WuSLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AkramMLSLC22,
  author       = {Waseem Akram and
                  Khalid Mahmood and
                  Xiong Li and
                  Mazhar Sadiq and
                  Zhihan Lv and
                  Shehzad Ashraf Chaudhry},
  title        = {An energy-efficient and secure identity based {RFID} authentication
                  scheme for vehicular cloud computing},
  journal      = {Comput. Networks},
  volume       = {217},
  pages        = {109335},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.109335},
  doi          = {10.1016/J.COMNET.2022.109335},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AkramMLSLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/OgundoyinK22,
  author       = {Sunday Oyinlola Ogundoyin and
                  Ismaila Adeniyi Kamil},
  title        = {Secure and privacy-preserving {D2D} communication in fog computing
                  services},
  journal      = {Comput. Networks},
  volume       = {210},
  pages        = {108942},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comnet.2022.108942},
  doi          = {10.1016/J.COMNET.2022.108942},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/OgundoyinK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PoongodiBAMSAH22,
  author       = {M. Poongodi and
                  Sami Bourouis and
                  Ahmed Najat Ahmed and
                  Vijayaragavan M. and
                  Venkatesan K. G. S. and
                  Wajdi Alhakami and
                  Mounir Hamdi},
  title        = {A Novel Secured Multi-Access Edge Computing based {VANET} with Neuro
                  fuzzy systems based Blockchain Framework},
  journal      = {Comput. Commun.},
  volume       = {192},
  pages        = {48--56},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.comcom.2022.05.014},
  doi          = {10.1016/J.COMCOM.2022.05.014},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/PoongodiBAMSAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LinMZZ22,
  author       = {Yu Lin and
                  Yunlong Mao and
                  Yuan Zhang and
                  Sheng Zhong},
  title        = {Secure deduplication schemes for content delivery in mobile edge computing},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102602},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102602},
  doi          = {10.1016/J.COSE.2022.102602},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LinMZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/AfzaliPS22,
  author       = {Mahboubeh Afzali and
                  Hamid Pourmohammadi and
                  Amin Mohammad Vali Samani},
  title        = {An efficient framework for trust evaluation of secure service selection
                  in fog computing based on QoS, reputation, and social criteria},
  journal      = {Computing},
  volume       = {104},
  number       = {7},
  pages        = {1643--1675},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00607-022-01053-w},
  doi          = {10.1007/S00607-022-01053-W},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/AfzaliPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/MahmoodSSZSN22,
  author       = {Adnan Mahmood and
                  Sarah Ali Siddiqui and
                  Quan Z. Sheng and
                  Wei Emma Zhang and
                  Hajime Suzuki and
                  Wei Ni},
  title        = {Trust on wheels: Towards secure and resource efficient IoV networks},
  journal      = {Computing},
  volume       = {104},
  number       = {6},
  pages        = {1337--1358},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00607-021-01040-7},
  doi          = {10.1007/S00607-021-01040-7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/MahmoodSSZSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/ShuklaP22,
  author       = {Shivangi Shukla and
                  Sankita J. Patel},
  title        = {A novel ECC-based provably secure and privacy-preserving multi-factor
                  authentication protocol for cloud computing},
  journal      = {Computing},
  volume       = {104},
  number       = {5},
  pages        = {1173--1202},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00607-021-01041-6},
  doi          = {10.1007/S00607-021-01041-6},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/ShuklaP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/SinghABBSVJ22,
  author       = {Maninderpal Singh and
                  Gagangeet Singh Aujla and
                  Rasmeet Singh Bali and
                  Ranbir Singh Batth and
                  Amritpal Singh and
                  Sahil Vashisht and
                  Anish Jindal},
  title        = {CovaDel: a blockchain-enabled secure and QoS-aware drone delivery
                  framework for COVID-like pandemics},
  journal      = {Computing},
  volume       = {104},
  number       = {7},
  pages        = {1589--1613},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00607-022-01064-7},
  doi          = {10.1007/S00607-022-01064-7},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/SinghABBSVJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/connection/WuHZW22,
  author       = {Zeng Wu and
                  Hui Huang and
                  Yuping Zhou and
                  Chenhuang Wu},
  title        = {A secure and efficient data deduplication framework for the internet
                  of things via edge computing and blockchain},
  journal      = {Connect. Sci.},
  volume       = {34},
  number       = {1},
  pages        = {1999--2025},
  year         = {2022},
  url          = {https://doi.org/10.1080/09540091.2022.2090514},
  doi          = {10.1080/09540091.2022.2090514},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/connection/WuHZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiuZJZZR22,
  author       = {Dengzhi Liu and
                  Yong Zhang and
                  Dongbao Jia and
                  Qiaosheng Zhang and
                  Xuefeng Zhao and
                  Huan Rong},
  title        = {Toward secure distributed data storage with error locating in blockchain
                  enabled edge computing},
  journal      = {Comput. Stand. Interfaces},
  volume       = {79},
  pages        = {103560},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103560},
  doi          = {10.1016/J.CSI.2021.103560},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LiuZJZZR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WuWSYJYW22,
  author       = {Yulin Wu and
                  Xuan Wang and
                  Willy Susilo and
                  Guomin Yang and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu and
                  Hao Wang},
  title        = {Generic server-aided secure multi-party computation in cloud computing},
  journal      = {Comput. Stand. Interfaces},
  volume       = {79},
  pages        = {103552},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103552},
  doi          = {10.1016/J.CSI.2021.103552},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/WuWSYJYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/AhamedN22,
  author       = {N. Niyaz Ahamed and
                  Duraipandian N},
  title        = {Secured Data Storage Using Deduplication in Cloud Computing Based
                  on Elliptic Curve Cryptography},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {41},
  number       = {1},
  pages        = {83--94},
  year         = {2022},
  url          = {https://doi.org/10.32604/csse.2022.020071},
  doi          = {10.32604/CSSE.2022.020071},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/AhamedN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejasp/JinLL22,
  author       = {Leisheng Jin and
                  Zhuo Liu and
                  Lijie Li},
  title        = {Chain-structure time-delay reservoir computing for synchronizing chaotic
                  signal and an application to secure communication},
  journal      = {{EURASIP} J. Adv. Signal Process.},
  volume       = {2022},
  number       = {1},
  pages        = {68},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13634-022-00893-0},
  doi          = {10.1186/S13634-022-00893-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejasp/JinLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/ChenLZLRYL22,
  author       = {Miaojiang Chen and
                  Wei Liu and
                  Ning Zhang and
                  Junling Li and
                  Yingying Ren and
                  Meng Yi and
                  Anfeng Liu},
  title        = {{GPDS:} {A} multi-agent deep reinforcement learning game for anti-jamming
                  secure computing in {MEC} network},
  journal      = {Expert Syst. Appl.},
  volume       = {210},
  pages        = {118394},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.eswa.2022.118394},
  doi          = {10.1016/J.ESWA.2022.118394},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/ChenLZLRYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/AliKAJ22,
  author       = {Ahmad Ali and
                  Abid Khan and
                  Mansoor Ahmed and
                  Gwanggil Jeon},
  title        = {{BCALS:} Blockchain-based secure log management system for cloud computing},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.4272},
  doi          = {10.1002/ETT.4272},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/AliKAJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/VaanchigQR22,
  author       = {Nyamsuren Vaanchig and
                  Zhiguang Qin and
                  Batjargal Ragchaasuren},
  title        = {Constructing secure-channel free identity-based encryption with equality
                  test for vehicle-data sharing in cloud computing},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {33},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/ett.3896},
  doi          = {10.1002/ETT.3896},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/VaanchigQR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/BaiFY22,
  author       = {Tianyu Bai and
                  Song Fu and
                  Qing Yang},
  title        = {Privacy-Preserving Object Detection with Secure Convolutional Neural
                  Networks for Vehicular Edge Computing},
  journal      = {Future Internet},
  volume       = {14},
  number       = {11},
  pages        = {316},
  year         = {2022},
  url          = {https://doi.org/10.3390/fi14110316},
  doi          = {10.3390/FI14110316},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fi/BaiFY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/SutarM22,
  author       = {Swapnil Sutar and
                  Priyanka Mekala},
  title        = {Design of a performance evaluation platform for ultra-light crypto-system
                  to develop a secure IoT node in edge computing},
  journal      = {Int. J. Embed. Syst.},
  volume       = {15},
  number       = {5},
  pages        = {429--447},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJES.2022.10052027},
  doi          = {10.1504/IJES.2022.10052027},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/SutarM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijguc/Zhong22,
  author       = {Peifang Zhong},
  title        = {Exploring the role of edge computing on the legal effect of secure
                  collaborative download protocol},
  journal      = {Int. J. Grid Util. Comput.},
  volume       = {13},
  number       = {2/3},
  pages        = {173--182},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJGUC.2022.124400},
  doi          = {10.1504/IJGUC.2022.124400},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijguc/Zhong22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/0002YKLBN022,
  author       = {Xu Yang and
                  Xun Yi and
                  Ibrahim Khalil and
                  Junwei Luo and
                  Elisa Bertino and
                  Surya Nepal and
                  Xinyi Huang},
  title        = {Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled
                  WBANs},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {14},
  pages        = {12563--12572},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3138989},
  doi          = {10.1109/JIOT.2021.3138989},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/0002YKLBN022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GaiFWZJC22,
  author       = {Keke Gai and
                  Zhengkang Fang and
                  Ruili Wang and
                  Liehuang Zhu and
                  Peng Jiang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Edge Computing and Lightning Network Empowered Secure Food Supply
                  Management},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {16},
  pages        = {14247--14259},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2020.3024694},
  doi          = {10.1109/JIOT.2020.3024694},
  timestamp    = {Wed, 04 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GaiFWZJC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HuiCSHZLL22,
  author       = {Yilong Hui and
                  Nan Cheng and
                  Zhou Su and
                  Yuanhao Huang and
                  Pincan Zhao and
                  Tom H. Luan and
                  Changle Li},
  title        = {Secure and Personalized Edge Computing Services in 6G Heterogeneous
                  Vehicular Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {8},
  pages        = {5920--5931},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3065970},
  doi          = {10.1109/JIOT.2021.3065970},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HuiCSHZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuDWJX22,
  author       = {Yiran Liu and
                  Ye Dong and
                  Hao Wang and
                  Han Jiang and
                  Qiuliang Xu},
  title        = {Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation
                  for IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {21},
  pages        = {21025--21037},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3176305},
  doi          = {10.1109/JIOT.2022.3176305},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuDWJX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/TangNXZZN22,
  author       = {Jianhang Tang and
                  Jiangtian Nie and
                  Zehui Xiong and
                  Jun Zhao and
                  Yang Zhang and
                  Dusit Niyato},
  title        = {Slicing-Based Reliable Resource Orchestration for Secure Software-Defined
                  Edge-Cloud Computing Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {4},
  pages        = {2637--2648},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3107490},
  doi          = {10.1109/JIOT.2021.3107490},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/TangNXZZN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangGLKHH22,
  author       = {Xiaoding Wang and
                  Sahil Garg and
                  Hui Lin and
                  Georges Kaddoum and
                  Jia Hu and
                  M. Shamim Hossain},
  title        = {A Secure Data Aggregation Strategy in Edge Computing and Blockchain-Empowered
                  Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {16},
  pages        = {14237--14246},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2020.3023588},
  doi          = {10.1109/JIOT.2020.3023588},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WangGLKHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/DengW0022,
  author       = {Yinjuan Deng and
                  Shangping Wang and
                  Qian Zhang and
                  Duo Zhang},
  title        = {A Secure Subscription-Push Service Scheme Based on Blockchain and
                  Edge Computing for IoT},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {445--466},
  year         = {2022},
  url          = {https://doi.org/10.3837/tiis.2022.02.005},
  doi          = {10.3837/TIIS.2022.02.005},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/DengW0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/QuWZ22,
  author       = {Zhiguo Qu and
                  Kunyi Wang and
                  Min Zheng},
  title        = {Secure quantum fog computing model based on blind quantum computation},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {13},
  number       = {8},
  pages        = {3807--3817},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12652-021-03402-7},
  doi          = {10.1007/S12652-021-03402-7},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/QuWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/DubeyS22,
  author       = {Kalka Dubey and
                  S. C. Sharma},
  title        = {An extended intelligent water drop approach for efficient {VM} allocation
                  in secure cloud computing framework},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {7},
  pages        = {3948--3958},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2020.11.001},
  doi          = {10.1016/J.JKSUCI.2020.11.001},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/DubeyS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/SohalS22,
  author       = {Manreet Sohal and
                  Sandeep Sharma},
  title        = {{BDNA-A} {DNA} inspired symmetric key cryptographic technique to secure
                  cloud computing},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {1},
  pages        = {1417--1425},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2018.09.024},
  doi          = {10.1016/J.JKSUCI.2018.09.024},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/SohalS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/ZeroualADB22,
  author       = {Abdelhakim Zeroual and
                  Mohamed Amroune and
                  Makhlouf Derdour and
                  Atef Bentahar},
  title        = {Lightweight deep learning model to secure authentication in Mobile
                  Cloud Computing},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {34},
  number       = {9},
  pages        = {6938--6948},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jksuci.2021.09.016},
  doi          = {10.1016/J.JKSUCI.2021.09.016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/ZeroualADB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jois/TingKSA22,
  author       = {Li Ting and
                  Mudassir Khan and
                  Ashutosh Sharma and
                  Mohd. Dilshad Ansari},
  title        = {A secure framework for IoT-based smart climate agriculture system:
                  Toward blockchain and edge computing},
  journal      = {J. Intell. Syst.},
  volume       = {31},
  number       = {1},
  pages        = {221--236},
  year         = {2022},
  url          = {https://doi.org/10.1515/jisys-2022-0012},
  doi          = {10.1515/JISYS-2022-0012},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jois/TingKSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/YuZT22,
  author       = {Xiaopeng Yu and
                  Wei Zhao and
                  Dianhua Tang},
  title        = {Efficient and provably secure multi-receiver signcryption scheme using
                  implicit certificate in edge computing},
  journal      = {J. Syst. Archit.},
  volume       = {126},
  pages        = {102457},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102457},
  doi          = {10.1016/J.SYSARC.2022.102457},
  timestamp    = {Wed, 27 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/YuZT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/LeeLHAR22,
  author       = {Cheng Pin Lee and
                  Fabian Tee Jee Leng and
                  Riyaz Ahamed Ariyaluran Habeeb and
                  Mohamed Ahzam Amanullah and
                  Muhammad Habib Ur Rehman},
  title        = {Edge computing-enabled secure and energy-efficient smart parking:
                  {A} review},
  journal      = {Microprocess. Microsystems},
  volume       = {93},
  pages        = {104612},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.micpro.2022.104612},
  doi          = {10.1016/J.MICPRO.2022.104612},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/LeeLHAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/YanWZ22,
  author       = {Leibing Yan and
                  Cuiqin Wang and
                  Wei Zheng},
  title        = {Secure efficiency maximization for UAV-assisted mobile edge computing
                  networks},
  journal      = {Phys. Commun.},
  volume       = {51},
  pages        = {101568},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.phycom.2021.101568},
  doi          = {10.1016/J.PHYCOM.2021.101568},
  timestamp    = {Fri, 18 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/YanWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BairagiPBL22,
  author       = {Ravi Bairagi and
                  Preetesh Purohit and
                  Kailash Chandra Bandhu and
                  Ratnesh Litoriya},
  title        = {A secure and efficient mechanism for scheduling tasks in cloud computing
                  environments},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.252},
  doi          = {10.1002/SPY2.252},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BairagiPBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/RamasamyKSPIB22,
  author       = {Lakshmana Kumar Ramasamy and
                  Firoz Khan and
                  Mohammad Shah and
                  Balusupati Veera Venkata Siva Prasad and
                  Celestine Iwendi and
                  Cresantus Biamba},
  title        = {Secure Smart Wearable Computing through Artificial Intelligence-Enabled
                  Internet of Things and Cyber-Physical Systems for Health Monitoring},
  journal      = {Sensors},
  volume       = {22},
  number       = {3},
  pages        = {1076},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22031076},
  doi          = {10.3390/S22031076},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/RamasamyKSPIB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ThirumalaisamyB22,
  author       = {Manikandan Thirumalaisamy and
                  Shajahan Basheer and
                  Shitharth Selvarajan and
                  Sara A. Althubiti and
                  Fayadh Alenezi and
                  Gautam Srivastava and
                  Jerry Chun{-}Wei Lin},
  title        = {Interaction of Secure Cloud Network and Crowd Computing for Smart
                  City Data Obfuscation},
  journal      = {Sensors},
  volume       = {22},
  number       = {19},
  pages        = {7169},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22197169},
  doi          = {10.3390/S22197169},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ThirumalaisamyB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TseliosPAACPM22,
  author       = {Christos Tselios and
                  Ilias Politis and
                  Dimitrios Amaxilatis and
                  Orestis Akrivopoulos and
                  Ioannis Chatzigiannakis and
                  Spyros Panagiotakis and
                  Evangelos K. Markakis},
  title        = {Melding Fog Computing and IoT for Deploying Secure, Response-Capable
                  Healthcare Services in 5G and Beyond},
  journal      = {Sensors},
  volume       = {22},
  number       = {9},
  pages        = {3375},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22093375},
  doi          = {10.3390/S22093375},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/TseliosPAACPM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/UmorenSAPD22,
  author       = {Otuekong Umoren and
                  Raman Singh and
                  Shahid Awan and
                  Zeeshan Pervez and
                  Keshav P. Dahal},
  title        = {Blockchain-Based Secure Authentication with Improved Performance for
                  Fog Computing},
  journal      = {Sensors},
  volume       = {22},
  number       = {22},
  pages        = {8969},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22228969},
  doi          = {10.3390/S22228969},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/UmorenSAPD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/WuLZMR22,
  author       = {Qing Wu and
                  Liangjun Li and
                  Leyou Zhang and
                  Yi Mu and
                  Fatemeh Rezaeibagha},
  title        = {Secure and Efficient General Circuits Attribute-Based Access Control
                  in Cloud Computing},
  journal      = {{IEEE} Syst. J.},
  volume       = {16},
  number       = {4},
  pages        = {5533--5543},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSYST.2022.3144730},
  doi          = {10.1109/JSYST.2022.3144730},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/WuLZMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/Zouka22,
  author       = {Hesham El Zouka},
  title        = {An Efficient and Secure Vehicular Networks Based on IoT and Cloud
                  Computing},
  journal      = {{SN} Comput. Sci.},
  volume       = {3},
  number       = {3},
  pages        = {240},
  year         = {2022},
  url          = {https://doi.org/10.1007/s42979-022-01096-y},
  doi          = {10.1007/S42979-022-01096-Y},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/Zouka22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ChengLWFWZ22,
  author       = {Hang Cheng and
                  Ximeng Liu and
                  Huaxiong Wang and
                  Yan Fang and
                  Meiqing Wang and
                  Xiaopeng Zhao},
  title        = {SecureAD: {A} Secure Video Anomaly Detection Framework on Convolutional
                  Neural Network in Edge Computing Environment},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {2},
  pages        = {1413--1427},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.2990946},
  doi          = {10.1109/TCC.2020.2990946},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ChengLWFWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiMMWLC22,
  author       = {Yingying Li and
                  Jianfeng Ma and
                  Yinbin Miao and
                  Yue Wang and
                  Ximeng Liu and
                  Kim{-}Kwang Raymond Choo},
  title        = {Similarity Search for Encrypted Images in Secure Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {2},
  pages        = {1142--1155},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.2989923},
  doi          = {10.1109/TCC.2020.2989923},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/LiMMWLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/MengZK22,
  author       = {Xinyu Meng and
                  Lei Zhang and
                  Burong Kang},
  title        = {Fast Secure and Anonymous Key Agreement Against Bad Randomness for
                  Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {3},
  pages        = {1819--1830},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.3008795},
  doi          = {10.1109/TCC.2020.3008795},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/MengZK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/WangCWLJZ22,
  author       = {Jin Wang and
                  Chunming Cao and
                  Jianping Wang and
                  Kejie Lu and
                  Admela Jukan and
                  Wei Zhao},
  title        = {Optimal Task Allocation and Coding Design for Secure Edge Computing
                  With Heterogeneous Edge Devices},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {4},
  pages        = {2817--2833},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2021.3050012},
  doi          = {10.1109/TCC.2021.3050012},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/WangCWLJZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/HeWCYJ22,
  author       = {Ling He and
                  Miaowen Wen and
                  Yingyang Chen and
                  Mengchun Yan and
                  Bingli Jiao},
  title        = {Delay Aware Secure Offloading for NOMA-Assisted Mobile Edge Computing
                  in Internet of Vehicles},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {70},
  number       = {8},
  pages        = {5271--5284},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCOMM.2022.3185064},
  doi          = {10.1109/TCOMM.2022.3185064},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/HeWCYJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/LaiFLDKN22,
  author       = {Xiazhi Lai and
                  Lisheng Fan and
                  Xianfu Lei and
                  Yansha Deng and
                  George K. Karagiannidis and
                  Arumugam Nallanathan},
  title        = {Secure Mobile Edge Computing Networks in the Presence of Multiple
                  Eavesdroppers},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {70},
  number       = {1},
  pages        = {500--513},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCOMM.2021.3119075},
  doi          = {10.1109/TCOMM.2021.3119075},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcom/LaiFLDKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/NieWWGWGL22,
  author       = {Laisen Nie and
                  Yixuan Wu and
                  Xiaojie Wang and
                  Lei Guo and
                  Guoyin Wang and
                  Xinbo Gao and
                  Shengtao Li},
  title        = {Intrusion Detection for Secure Social Internet of Things Based on
                  Collaborative Edge Computing: {A} Generative Adversarial Network-Based
                  Approach},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {9},
  number       = {1},
  pages        = {134--145},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCSS.2021.3063538},
  doi          = {10.1109/TCSS.2021.3063538},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/NieWWGWGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuNLZXHD22,
  author       = {Shengmin Xu and
                  Jianting Ning and
                  Yingjiu Li and
                  Yinghui Zhang and
                  Guowen Xu and
                  Xinyi Huang and
                  Robert H. Deng},
  title        = {Match in My Way: Fine-Grained Bilateral Access Control for Secure
                  Cloud-Fog Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {1064--1077},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3001557},
  doi          = {10.1109/TDSC.2020.3001557},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuNLZXHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/XiaZGLJ22,
  author       = {Zhuoqun Xia and
                  Yichao Zhang and
                  Ke Gu and
                  Xiong Li and
                  Weijia Jia},
  title        = {Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation
                  Scheme for Fog Computing-Based Smart Metering System},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {6},
  number       = {1},
  pages        = {313--328},
  year         = {2022},
  url          = {https://doi.org/10.1109/TGCN.2021.3122793},
  doi          = {10.1109/TGCN.2021.3122793},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgcn/XiaZGLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuHLL22,
  author       = {Donghyun Yu and
                  Ruei{-}Hau Hsu and
                  Jemin Lee and
                  Sungjin Lee},
  title        = {{EC-SVC:} Secure {CAN} Bus In-Vehicle Communications With Fine-Grained
                  Access Control Based on Edge Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1388--1403},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3152405},
  doi          = {10.1109/TIFS.2022.3152405},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuHLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HoudaBKKG22,
  author       = {Zakaria Abou El Houda and
                  Bouziane Brik and
                  Adlen Ksentini and
                  Lyes Khoukhi and
                  Mohsen Guizani},
  title        = {When Federated Learning Meets Game Theory: {A} Cooperative Framework
                  to Secure IIoT Applications on Edge Computing},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {11},
  pages        = {7988--7997},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2022.3170347},
  doi          = {10.1109/TII.2022.3170347},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/HoudaBKKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LuDGHWZG22,
  author       = {Weidang Lu and
                  Yu Ding and
                  Yuan Gao and
                  Su Hu and
                  Yuan Wu and
                  Nan Zhao and
                  Yi Gong},
  title        = {Resource and Trajectory Optimization for Secure Communications in
                  Dual Unmanned Aerial Vehicle Mobile Edge Computing Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {4},
  pages        = {2704--2713},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3087726},
  doi          = {10.1109/TII.2021.3087726},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LuDGHWZG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhouJLLMGT22,
  author       = {Zhenyu Zhou and
                  Zehan Jia and
                  Haijun Liao and
                  Wenbing Lu and
                  Shahid Mumtaz and
                  Mohsen Guizani and
                  Muhammad Tariq},
  title        = {Secure and Latency-Aware Digital Twin Assisted Resource Scheduling
                  for 5G Edge Computing-Empowered Distribution Grids},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {7},
  pages        = {4933--4943},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3137349},
  doi          = {10.1109/TII.2021.3137349},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ZhouJLLMGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/KimLKC22,
  author       = {Hyeong{-}Jin Kim and
                  Hyunjo Lee and
                  Yong{-}Ki Kim and
                  Jae{-}Woo Chang},
  title        = {Privacy-preserving kNN query processing algorithms via secure two-party
                  computation over encrypted database in cloud computing},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {7},
  pages        = {9245--9284},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11227-021-04286-2},
  doi          = {10.1007/S11227-021-04286-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/KimLKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/WuM0GK22,
  author       = {Tsu{-}Yang Wu and
                  Qian Meng and
                  Lei Yang and
                  Xinglan Guo and
                  Saru Kumari},
  title        = {A provably secure lightweight authentication protocol in mobile edge
                  computing environments},
  journal      = {J. Supercomput.},
  volume       = {78},
  number       = {12},
  pages        = {13893--13914},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11227-022-04411-9},
  doi          = {10.1007/S11227-022-04411-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/WuM0GK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SamyEYZZ22,
  author       = {Ahmed Samy and
                  Ibrahim A. Elgendy and
                  Haining Yu and
                  Weizhe Zhang and
                  Hongli Zhang},
  title        = {Secure Task Offloading in Blockchain-Enabled Mobile Edge Computing
                  With Deep Reinforcement Learning},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {4872--4887},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3190493},
  doi          = {10.1109/TNSM.2022.3190493},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/SamyEYZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/BibiAMKD22,
  author       = {Iram Bibi and
                  Adnan Akhunzada and
                  Jahanzaib Malik and
                  Muhammad Khurram Khan and
                  Muhammad Dawood},
  title        = {Secure Distributed Mobile Volunteer Computing with Android},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {1},
  pages        = {2:1--2:21},
  year         = {2022},
  url          = {https://doi.org/10.1145/3428151},
  doi          = {10.1145/3428151},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/BibiAMKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ShinKH22,
  author       = {Hyungjune Shin and
                  Dongyoung Koo and
                  Junbeom Hur},
  title        = {Secure and Efficient Hybrid Data Deduplication in Edge Computing},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {3},
  pages        = {80:1--80:25},
  year         = {2022},
  url          = {https://doi.org/10.1145/3537675},
  doi          = {10.1145/3537675},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/ShinKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/QiuXZZ22,
  author       = {Meikang Qiu and
                  Ke Xu and
                  Cheng Zhang and
                  Tianwei Zhang},
  title        = {Introduction to the Special Section on Energy-efficient and Secure
                  Computing for Artificial Intelligence and Beyond},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {18},
  number       = {4},
  pages        = {51e:1--51e:3},
  year         = {2022},
  url          = {https://doi.org/10.1145/3558553},
  doi          = {10.1145/3558553},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/QiuXZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/Namasudra22,
  author       = {Suyel Namasudra},
  title        = {Fast and Secure Data Accessing by Using {DNA} Computing for the Cloud
                  Environment},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {2289--2300},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.3046471},
  doi          = {10.1109/TSC.2020.3046471},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/Namasudra22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YangTLZS22,
  author       = {Mengmeng Yang and
                  Ivan Tjuawinata and
                  Kwok{-}Yan Lam and
                  Jun Zhao and
                  Lin Sun},
  title        = {Secure Hot Path Crowdsourcing With Local Differential Privacy Under
                  Fog Computing Architecture},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {2188--2201},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.3039336},
  doi          = {10.1109/TSC.2020.3039336},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/YangTLZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LiuZA22a,
  author       = {Weiqi Liu and
                  Shuai Zhang and
                  Nirwan Ansari},
  title        = {Secure Mobile Edge Computing via a Drone-Enabled FSO-Based Heterogeneous
                  Network},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {11},
  pages        = {12264--12274},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2022.3194407},
  doi          = {10.1109/TVT.2022.3194407},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/LiuZA22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/MaoLZDZWL22,
  author       = {Sun Mao and
                  Lei Liu and
                  Ning Zhang and
                  Mianxiong Dong and
                  Jun Zhao and
                  Jinsong Wu and
                  Victor C. M. Leung},
  title        = {Reconfigurable Intelligent Surface-Assisted Secure Mobile Edge Computing
                  Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {6},
  pages        = {6647--6660},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2022.3162044},
  doi          = {10.1109/TVT.2022.3162044},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/MaoLZDZWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/TangFZLGW22,
  author       = {Qingqing Tang and
                  Zesong Fei and
                  Jianchao Zheng and
                  Bin Li and
                  Lei Guo and
                  Jing Wang},
  title        = {Secure Aerial Computing: Convergence of Mobile Edge Computing and
                  Blockchain for {UAV} Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {11},
  pages        = {12073--12087},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2022.3189818},
  doi          = {10.1109/TVT.2022.3189818},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/TangFZLGW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/RakeeiM22,
  author       = {Mohammad Amin Rakeei and
                  Farokhlagha Moazami},
  title        = {An efficient and provably secure authenticated key agreement scheme
                  for mobile edge computing},
  journal      = {Wirel. Networks},
  volume       = {28},
  number       = {7},
  pages        = {2983--2999},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11276-022-03005-w},
  doi          = {10.1007/S11276-022-03005-W},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/RakeeiM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/Saad22,
  author       = {Aldosary Saad},
  title        = {Hybrid Secure Equivalent Computing Model for Distributed Computing
                  Applications},
  journal      = {Wirel. Pers. Commun.},
  volume       = {127},
  number       = {1},
  pages        = {319--339},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-08265-x},
  doi          = {10.1007/S11277-021-08265-X},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wpc/Saad22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/ShamshadRMKO22,
  author       = {Salman Shamshad and
                  Minahil Rana and
                  Khalid Mahmood and
                  Muhammad Khurram Khan and
                  Mohammad S. Obaidat},
  title        = {On the Security of {A} Secure Anonymous Identity-Based Scheme in New
                  Authentication Architecture for Mobile Edge Computing},
  journal      = {Wirel. Pers. Commun.},
  volume       = {124},
  number       = {1},
  pages        = {283--292},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-021-09338-7},
  doi          = {10.1007/S11277-021-09338-7},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/ShamshadRMKO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/AktypiKVR22,
  author       = {Angeliki Aktypi and
                  Dimitris Karnikis and
                  Nikos Vasilakis and
                  Kasper Rasmussen},
  title        = {Themis: {A} Secure Decentralized Framework for Microservice Interaction
                  in Serverless Computing},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {10:1--10:11},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3538983},
  doi          = {10.1145/3538969.3538983},
  timestamp    = {Fri, 19 Aug 2022 09:45:12 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/AktypiKVR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/IwamuraKI22,
  author       = {Keiichi Iwamura and
                  Ahmad Akmal Aminuddin Mohd Kamal and
                  Masaki Inamura},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {TTP-Aided Secure Computation using Secret Sharing With Only One Computing
                  Server},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1243--1245},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3527281},
  doi          = {10.1145/3488932.3527281},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/IwamuraKI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/SearleGGK22,
  author       = {Richard Searle and
                  Prabhanjan Gururaj and
                  Anubhav Gupta and
                  Kiran Kannur},
  editor       = {Shusaku Tsumoto and
                  Yukio Ohsawa and
                  Lei Chen and
                  Dirk Van den Poel and
                  Xiaohua Hu and
                  Yoichi Motomura and
                  Takuya Takagi and
                  Lingfei Wu and
                  Ying Xie and
                  Akihiro Abe and
                  Vijay Raghavan},
  title        = {Secure Implementation of Artificial Intelligence Applications for
                  Anti-Money Laundering using Confidential Computing},
  booktitle    = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,
                  Japan, December 17-20, 2022},
  pages        = {3092--3098},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigData55660.2022.10021108},
  doi          = {10.1109/BIGDATA55660.2022.10021108},
  timestamp    = {Tue, 11 Jun 2024 10:44:02 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/SearleGGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/AlexDD22,
  author       = {Sona Alex and
                  K. J. Dhanaraj and
                  P. P. Deepthi},
  title        = {Secure Integer Comparison Protocol For ML-based Disease Diagnosis
                  In {MHN} With Energy Efficient Edge Computing},
  booktitle    = {56th Annual Conference on Information Sciences and Systems, {CISS}
                  2022, Princeton, NJ, USA, March 9-11, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CISS53076.2022.9751179},
  doi          = {10.1109/CISS53076.2022.9751179},
  timestamp    = {Fri, 22 Apr 2022 19:18:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/AlexDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/MukherjeeB22,
  author       = {Pratyusa Mukherjee and
                  Rabindra Kumar Barik},
  title        = {Fog-QKD:Towards secure geospatial data sharing mechanism in geospatial
                  fog computing system based on Quantum Key Distribution},
  booktitle    = {{OITS} International Conference on Information Technology, {OCIT}
                  2022, Bhubaneswar, India, December 14-16, 2022},
  pages        = {485--490},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/OCIT56763.2022.00096},
  doi          = {10.1109/OCIT56763.2022.00096},
  timestamp    = {Fri, 10 Mar 2023 12:02:44 +0100},
  biburl       = {https://dblp.org/rec/conf/cit/MukherjeeB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/CantuGR22,
  author       = {Asahi Cantu and
                  Jiahui Geng and
                  Chunming Rong},
  title        = {{NFT} as a proof of Digital Ownership-reward system integrated to
                  a Secure Distributed Computing Blockchain Framework},
  booktitle    = {{IEEE} International Conference on Cloud Computing Technology and
                  Science, CloudCom 2022, Bangkok, Thailand, December 13-16, 2022},
  pages        = {97--104},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CloudCom55334.2022.00024},
  doi          = {10.1109/CLOUDCOM55334.2022.00024},
  timestamp    = {Thu, 11 Apr 2024 16:38:29 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/CantuGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/YuTSYFC22,
  author       = {Huiqun Yu and
                  Qifeng Tang and
                  Zhiqing Shao and
                  Yiming Yue and
                  Guisheng Fan and
                  Liqiong Chen},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Wei Wei and
                  Tasos Dagiuklas},
  title        = {Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge
                  Computing},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 18th {EAI} International Conference, CollaborateCom 2022, Hangzhou,
                  China, October 15-16, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {461},
  pages        = {111--132},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-24386-8\_7},
  doi          = {10.1007/978-3-031-24386-8\_7},
  timestamp    = {Wed, 01 Feb 2023 14:55:09 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/YuTSYFC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZouWLLGL22,
  author       = {Xiaotian Zou and
                  Jin Wang and
                  Can Liu and
                  Lingzhi Li and
                  Fei Gu and
                  Guojing Li},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Wei Wei and
                  Tasos Dagiuklas},
  title        = {Secure and Private Coding for Edge Computing Against Cooperative Attack
                  with Low Communication Cost and Computational Load},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 18th {EAI} International Conference, CollaborateCom 2022, Hangzhou,
                  China, October 15-16, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {460},
  pages        = {213--232},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-24383-7\_12},
  doi          = {10.1007/978-3-031-24383-7\_12},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ZouWLLGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cslaw/WalshVCSB22,
  author       = {Julissa Milligan Walsh and
                  Mayank Varia and
                  Aloni Cohen and
                  Andrew Sellars and
                  Azer Bestavros},
  editor       = {Daniel J. Weitzner and
                  Joan Feigenbaum and
                  Christopher S. Yoo},
  title        = {Multi-Regulation Computing: Examining the Legal and Policy Questions
                  That Arise From Secure Multiparty Computation},
  booktitle    = {Proceedings of the 2022 Symposium on Computer Science and Law, {CSLAW}
                  2022, Washington DC, USA, November 1-2, 2022},
  pages        = {53--65},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511265.3550445},
  doi          = {10.1145/3511265.3550445},
  timestamp    = {Thu, 03 Nov 2022 11:26:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cslaw/WalshVCSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/SharmaGP22,
  author       = {Pradip Kumar Sharma and
                  Prosanta Gope and
                  Deepak Puthal},
  title        = {Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving
                  Computing Architecture for IoT Network},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022 - Workshops, Genoa, Italy, June 6-10, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSPW55150.2022.00008},
  doi          = {10.1109/EUROSPW55150.2022.00008},
  timestamp    = {Mon, 04 Jul 2022 17:06:18 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/SharmaGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/YaghiFQAHYG22,
  author       = {Maha Yaghi and
                  Zia Farhan and
                  Lana Qamhieh and
                  Marah Talal Alhalabi and
                  Mohamad Hammoudi and
                  Mohammed Yaghi and
                  Mohammed Ghazal},
  editor       = {Muhammad Younas and
                  Irfan Awan and
                  Wenny Rahayu},
  title        = {Secure Proctoring of Contactless Handwritten-Assessments with Insufficient
                  Computing Resources using Smartphones},
  booktitle    = {9th International Conference on Future Internet of Things and Cloud,
                  FiCloud 2022, Rome, Italy, August 22-24, 2022},
  pages        = {302--306},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/FiCloud57274.2022.00050},
  doi          = {10.1109/FICLOUD57274.2022.00050},
  timestamp    = {Wed, 19 Oct 2022 21:24:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ficloud/YaghiFQAHYG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KaratiD22,
  author       = {Arijit Karati and
                  Sajal K. Das},
  title        = {Federated Secure Data Sharing by Edge-Cloud Computing Model},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {1362--1367},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10001335},
  doi          = {10.1109/GLOBECOM48099.2022.10001335},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/KaratiD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiuHZLNS22,
  author       = {Lingshuang Liu and
                  Cheng Huang and
                  Dan Zhu and
                  Dongxiao Liu and
                  Jianbing Ni and
                  Xuemin Sherman Shen},
  title        = {Secure and Distributed Access Control for Dynamic Pervasive Edge Computing
                  Services},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro,
                  Brazil, December 4-8, 2022},
  pages        = {5487--5492},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/GLOBECOM48099.2022.10000715},
  doi          = {10.1109/GLOBECOM48099.2022.10000715},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiuHZLNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/Mathew22,
  author       = {Sanu K. Mathew},
  editor       = {Ioannis Savidis and
                  Avesta Sasan and
                  Himanshu Thapliyal and
                  Ronald F. DeMara},
  title        = {Attack-Resistant Circuit Technologies for sub-5nm Secure Computing
                  Platforms},
  booktitle    = {{GLSVLSI} '22: Great Lakes Symposium on {VLSI} 2022, Irvine {CA} USA,
                  June 6 - 8, 2022},
  pages        = {403},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3526241.3530053},
  doi          = {10.1145/3526241.3530053},
  timestamp    = {Fri, 03 Jun 2022 08:45:20 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/Mathew22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/KimKK22a,
  author       = {Yonghwan Kim and
                  Jahwan Koo and
                  Ung{-}Mo Kim},
  editor       = {Masaaki Kurosu},
  title        = {Vulnerabilities and Secure Coding for Serverless Applications on Cloud
                  Computing},
  booktitle    = {Human-Computer Interaction. User Experience and Behavior - Thematic
                  Area, {HCI} 2022, Held as Part of the 24th {HCI} International Conference,
                  {HCII} 2022, Virtual Event, June 26 - July 1, 2022, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13304},
  pages        = {145--163},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-05412-9\_10},
  doi          = {10.1007/978-3-031-05412-9\_10},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/KimKK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/XiaoJL22,
  author       = {Di Xiao and
                  Pengcen Jiang and
                  Min Li},
  title        = {Communication-Efficient Federated Learning Based on Chained Secure
                  Multiparty Computing and Compressed Sensing},
  booktitle    = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications;
                  8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart
                  City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022,
                  Hainan, China, December 18-20, 2022},
  pages        = {1539--1546},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00236},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00236},
  timestamp    = {Thu, 06 Apr 2023 11:34:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/XiaoJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpec/EdieKMH22,
  author       = {Kelsie Edie and
                  Kurt Keville and
                  Lauren Milechin and
                  Chris Hill},
  title        = {SuperCloud Lite in the Cloud - lightweight, secure, self-service,
                  on-demand mechanisms for creating customizable research computing
                  environments},
  booktitle    = {{IEEE} High Performance Extreme Computing Conference, {HPEC} 2022,
                  Waltham, MA, USA, September 19-23, 2022},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HPEC55821.2022.10089529},
  doi          = {10.1109/HPEC55821.2022.10089529},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpec/EdieKMH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3i/SinghCBPGP22,
  author       = {Rajesh Singh and
                  Akkaraju Sailesh Chandra and
                  Babeetta Bbhagat and
                  Jeidy Panduro{-}Ramirez and
                  Anil Pandurang Gaikwad and
                  Bhasker Pant},
  title        = {Cloud Computing, Machine Learning, and Secure Data Sharing enabled
                  through Blockchain},
  booktitle    = {5th International Conference on Contemporary Computing and Informatics,
                  {IC3I} 2022, Uttar Pradesh, India, December 14-16, 2022},
  pages        = {282--286},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IC3I56241.2022.10072925},
  doi          = {10.1109/IC3I56241.2022.10072925},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3i/SinghCBPGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaiic/BhatADS22,
  author       = {Sameer Ahmad Bhat and
                  Dalia Alyahya and
                  Muneer Ahmad Dar and
                  Saadiya Shah},
  title        = {Edge-Computing based Secure E-learning Platforms},
  booktitle    = {2022 International Conference on Artificial Intelligence in Information
                  and Communication, {ICAIIC} 2022, Jeju Island, Korea, Republic of,
                  February 21-24, 2022},
  pages        = {324--328},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICAIIC54071.2022.9722680},
  doi          = {10.1109/ICAIIC54071.2022.9722680},
  timestamp    = {Tue, 08 Mar 2022 11:05:05 +0100},
  biburl       = {https://dblp.org/rec/conf/icaiic/BhatADS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiZCS22,
  author       = {Shiyu Li and
                  Yuan Zhang and
                  Nan Cheng and
                  Yaqing Song},
  title        = {Badge: Blockchain-Assisted Secure Authenticated Data Transmission
                  in Mobile Edge Computing},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul,
                  Korea, May 16-20, 2022},
  pages        = {4757--4762},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICC45855.2022.9838606},
  doi          = {10.1109/ICC45855.2022.9838606},
  timestamp    = {Fri, 19 Aug 2022 10:24:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LiZCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/WangLPHZWZ22,
  author       = {Dawei Wang and
                  Xuanrui Li and
                  Linna Pang and
                  Yixin He and
                  Fuhui Zhou and
                  Ling Wang and
                  Ruonan Zhang},
  title        = {IRS-Aided Secure Mobile Edge Computing for {NOMA} Networks},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2022, Sanshui, Foshan, China, August 11-13, 2022},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCC55456.2022.9880751},
  doi          = {10.1109/ICCC55456.2022.9880751},
  timestamp    = {Mon, 09 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/WangLPHZWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/FangLZCZL22,
  author       = {Xiongjie Fang and
                  Ruopan Lai and
                  Zhipeng Zhou and
                  Ziyang Chen and
                  Peijia Zheng and
                  Wei Lu},
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {Efficient and Secure Outsourced Image Watermarking in Cloud Computing},
  booktitle    = {Artificial Intelligence and Security - 8th International Conference,
                  {ICAIS} 2022, Qinghai, China, July 15-20, 2022, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13339},
  pages        = {526--537},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06788-4\_44},
  doi          = {10.1007/978-3-031-06788-4\_44},
  timestamp    = {Thu, 28 Jul 2022 13:13:16 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/FangLZCZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccr/SawhneyKD22,
  author       = {Govind Sawhney and
                  Gagandeep Kaur and
                  Rajesh Deorari},
  title        = {{CSPM:} {A} secure Cloud Computing Performance Management Model},
  booktitle    = {2022 International Conference on Cyber Resilience (ICCR), Dubai, United
                  Arab Emirates, October 6-7, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICCR56254.2022.9995865},
  doi          = {10.1109/ICCR56254.2022.9995865},
  timestamp    = {Fri, 31 May 2024 12:01:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iccr/SawhneyKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/AkmanGN50,
  author       = {Gizem Akman and
                  Philip Ginzboorg and
                  Valtteri Niemi},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Sanjay Misra and
                  Ana Maria A. C. Rocha and
                  Chiara Garau},
  title        = {{AKMA} for Secure Multi-access Edge Computing Mobility in 5G},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2022 Workshops
                  - Malaga, Spain, July 4-7, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13380},
  pages        = {432--449},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-10542-5\_30},
  doi          = {10.1007/978-3-031-10542-5\_30},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/AkmanGN50.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/RamneekP22,
  author       = {Ramneek and
                  Sangheon Pack},
  title        = {A Lightweight and Secure Vehicular Edge Computing Framework for {V2X}
                  Services},
  booktitle    = {42nd {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2022, Bologna, Italy, July 10-13, 2022},
  pages        = {1316--1317},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICDCS54860.2022.00146},
  doi          = {10.1109/ICDCS54860.2022.00146},
  timestamp    = {Thu, 20 Oct 2022 09:13:03 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/RamneekP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/YuZSLLWWL22,
  author       = {Zhaoyang Yu and
                  Sinong Zhao and
                  Tongtong Su and
                  Wenwen Liu and
                  Xiaoguang Liu and
                  Gang Wang and
                  Zehua Wang and
                  Victor C. M. Leung},
  editor       = {Javier Troya and
                  Brahim Medjahed and
                  Mario Piattini and
                  Lina Yao and
                  Pablo Fern{\'{a}}ndez and
                  Antonio Ruiz{-}Cort{\'{e}}s},
  title        = {DeepSCJD: An Online Deep Learning-Based Model for Secure Collaborative
                  Job Dispatching in Edge Computing},
  booktitle    = {Service-Oriented Computing - 20th International Conference, {ICSOC}
                  2022, Seville, Spain, November 29 - December 2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13740},
  pages        = {481--497},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20984-0\_34},
  doi          = {10.1007/978-3-031-20984-0\_34},
  timestamp    = {Fri, 25 Nov 2022 16:03:20 +0100},
  biburl       = {https://dblp.org/rec/conf/icsoc/YuZSLLWWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icufn/ParkYJCK22,
  author       = {Soohyun Park and
                  Minjae Yoo and
                  Soyi Jung and
                  Minseok Choi and
                  Joongheon Kim},
  title        = {Introduction to Secure Computing Methods in Unmanned Aerial Vehicles},
  booktitle    = {Thirteenth International Conference on Ubiquitous and Future Networks,
                  {ICUFN} 2022, Barcelona, Spain, July 5-8, 2022},
  pages        = {239--241},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICUFN55119.2022.9829564},
  doi          = {10.1109/ICUFN55119.2022.9829564},
  timestamp    = {Tue, 26 Jul 2022 15:58:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icufn/ParkYJCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip11-10/ChadwickGDD22,
  author       = {Samuel Chadwick and
                  Scott R. Graham and
                  James Dean and
                  Matthew Dallmeyer},
  editor       = {Jason Staggs and
                  Sujeet Shenoi},
  title        = {Leveraging Confidential Computing to Enable Secure Information Sharing},
  booktitle    = {Critical Infrastructure Protection {XVI} - 16th {IFIP} {WG} 11.10
                  International Conference, {ICCIP} 2022, Virtual Event, March 14-15,
                  2022, Revised Selected Papers},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {666},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20137-0\_9},
  doi          = {10.1007/978-3-031-20137-0\_9},
  timestamp    = {Thu, 08 Dec 2022 17:43:50 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11-10/ChadwickGDD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/MaYZB22,
  author       = {Xuewei Ma and
                  Wenyuan Yang and
                  Yuesheng Zhu and
                  Zhiqiang Bai},
  title        = {A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership
                  Management in Cloud Computing},
  booktitle    = {{IEEE} International Performance, Computing, and Communications Conference,
                  {IPCCC} 2022, Austin, TX, USA, November 11-13, 2022},
  pages        = {194--201},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IPCCC55026.2022.9894331},
  doi          = {10.1109/IPCCC55026.2022.9894331},
  timestamp    = {Wed, 01 Mar 2023 21:14:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/MaYZB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/TangAHGAA22,
  author       = {Tingting Tang and
                  Ramy E. Ali and
                  Hanieh Hashemi and
                  Tynan Gangwani and
                  Salman Avestimehr and
                  Murali Annavaram},
  title        = {Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private
                  Distributed Machine Learning},
  booktitle    = {2022 {IEEE} International Parallel and Distributed Processing Symposium,
                  {IPDPS} 2022, Lyon, France, May 30 - June 3, 2022},
  pages        = {628--638},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IPDPS53621.2022.00067},
  doi          = {10.1109/IPDPS53621.2022.00067},
  timestamp    = {Fri, 22 Jul 2022 11:14:30 +0200},
  biburl       = {https://dblp.org/rec/conf/ipps/TangAHGAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isci/ChenZZZ22,
  author       = {Yichao Chen and
                  Kai Zhao and
                  Qinghai Zhang and
                  Heng Zhang},
  title        = {Incentive Mechanism for Secure Mobile Edge Computing under Managed
                  Eavesdropping Risk},
  booktitle    = {10th {IEEE} International Conference on Smart City and Informatization,
                  iSCI 2022, Wuhan, China, December 9-11, 2022},
  pages        = {49--56},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/iSCI57775.2022.00017},
  doi          = {10.1109/ISCI57775.2022.00017},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isci/ChenZZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/PuthalDM22,
  author       = {Deepak Puthal and
                  Ernesto Damiani and
                  Saraju P. Mohanty},
  title        = {Secure and Scalable Collaborative Edge Computing using Decision Tree},
  booktitle    = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2022, Nicosia,
                  Cyprus, July 4-6, 2022},
  pages        = {247--252},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISVLSI54635.2022.00055},
  doi          = {10.1109/ISVLSI54635.2022.00055},
  timestamp    = {Tue, 25 Oct 2022 21:20:51 +0200},
  biburl       = {https://dblp.org/rec/conf/isvlsi/PuthalDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isvlsi/ZouZCWK22,
  author       = {Minhui Zou and
                  Junlong Zhou and
                  Xiaotong Cui and
                  Wei Wang and
                  Shahar Kvatinsky},
  title        = {Enhancing Security of Memristor Computing System Through Secure Weight
                  Mapping},
  booktitle    = {{IEEE} Computer Society Annual Symposium on VLSI, {ISVLSI} 2022, Nicosia,
                  Cyprus, July 4-6, 2022},
  pages        = {182--187},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISVLSI54635.2022.00044},
  doi          = {10.1109/ISVLSI54635.2022.00044},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isvlsi/ZouZCWK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/LeJLW22,
  author       = {Yuwei Le and
                  Yiheng Jiang and
                  Xintong Ling and
                  Jiaheng Wang},
  title        = {Efficient and Secure Collaborative Processing in Mobile Edge Computing
                  via Blockchain},
  booktitle    = {2022 {IEEE} International Conferences on Internet of Things (iThings)
                  and {IEEE} Green Computing {\&} Communications (GreenCom) and
                  {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE}
                  Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics),
                  Espoo, Finland, August 22-25, 2022},
  pages        = {155--160},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00061},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS55523.2022.00061},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/LeJLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/ChenS22,
  author       = {Jiajun Chen and
                  Chi Wan Sung},
  title        = {Weakly Secure Coded Distributed Computing with Group-based Function
                  Assignment},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2022, Mumbai, India, November
                  1-9, 2022},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ITW54588.2022.9965788},
  doi          = {10.1109/ITW54588.2022.9965788},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/ChenS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/JiangQSCZWCZLC22,
  author       = {Jianyu Jiang and
                  Ji Qi and
                  Tianxiang Shen and
                  Xusheng Chen and
                  Shixiong Zhao and
                  Sen Wang and
                  Li Chen and
                  Gong Zhang and
                  Xiapu Luo and
                  Heming Cui},
  title        = {{CRONUS:} Fault-isolated, Secure and High-performance Heterogeneous
                  Computing for Trusted Execution Environment},
  booktitle    = {55th {IEEE/ACM} International Symposium on Microarchitecture, {MICRO}
                  2022, Chicago, IL, USA, October 1-5, 2022},
  pages        = {124--143},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MICRO56248.2022.00019},
  doi          = {10.1109/MICRO56248.2022.00019},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/micro/JiangQSCZWCZLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsp/ZhouCDZL22,
  author       = {Zhipeng Zhou and
                  Bing Chen and
                  Chenyu Dong and
                  Peijia Zheng and
                  Wei Lu},
  title        = {Secure Image Watermarking in Cloud Computing with Distributed Paillier
                  Cryptosystem},
  booktitle    = {24th {IEEE} International Workshop on Multimedia Signal Processing,
                  {MMSP} 2022, Shanghai, China, September 26-28, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/MMSP55362.2022.9949258},
  doi          = {10.1109/MMSP55362.2022.9949258},
  timestamp    = {Fri, 25 Nov 2022 16:03:16 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsp/ZhouCDZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/Miglani0KM22,
  author       = {Arzoo Miglani and
                  Neeraj Kumar and
                  Avadh Kishor and
                  Nazeeruddin Mohammad},
  title        = {UAV-enabled edge computing and blockchain based secure charging station
                  selection for energy trading in {V2G} environment},
  booktitle    = {Proceedings of the 5th International {ACM} Mobicom Workshop on Drone
                  Assisted Wireless Communications for 5G and Beyond, DroneCom 2022,
                  Sydney, NSW, Australia, 17 October 2022},
  pages        = {103--108},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3555661.3560872},
  doi          = {10.1145/3555661.3560872},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicom/Miglani0KM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcloud/TiwariJ22,
  author       = {Geetika Tiwari and
                  Ruchi Jain},
  title        = {Detecting and Classifying Incoming Traffic in a Secure Cloud Computing
                  Environment Using Machine Learning and Deep Learning System},
  booktitle    = {7th {IEEE} International Conference on Smart Cloud, SmartCloud 2022,
                  Shanghai, China, October 8-10, 2022},
  pages        = {16--21},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SmartCloud55982.2022.00010},
  doi          = {10.1109/SMARTCLOUD55982.2022.00010},
  timestamp    = {Thu, 24 Nov 2022 14:56:22 +0100},
  biburl       = {https://dblp.org/rec/conf/smartcloud/TiwariJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/Cao0LW22,
  author       = {Dayu Cao and
                  Yinghui Zhang and
                  Wei Liu and
                  Xuanni Wei},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Miroslaw Kutylowski},
  title        = {Secure Asynchronous Federated Learning for Edge Computing Devices},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 8th International
                  Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1663},
  pages        = {138--147},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-7242-3\_9},
  doi          = {10.1007/978-981-19-7242-3\_9},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/Cao0LW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/JinKNRSW22,
  author       = {Weizhao Jin and
                  Bhaskar Krishnamachari and
                  Muhammad Naveed and
                  Srivatsan Ravi and
                  Eduard Sanou and
                  Kwame{-}Lante Wright},
  title        = {Secure Publish-Process-Subscribe System for Dispersed Computing},
  booktitle    = {41st International Symposium on Reliable Distributed Systems, {SRDS}
                  2022, Vienna, Austria, September 19-22, 2022},
  pages        = {58--68},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SRDS55811.2022.00016},
  doi          = {10.1109/SRDS55811.2022.00016},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/srds/JinKNRSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/LiC0GBTZWHG22,
  author       = {Zijun Li and
                  Jiagan Cheng and
                  Quan Chen and
                  Eryu Guan and
                  Zizheng Bian and
                  Yi Tao and
                  Bin Zha and
                  Qiang Wang and
                  Weidong Han and
                  Minyi Guo},
  editor       = {Jiri Schindler and
                  Noa Zilberman},
  title        = {RunD: {A} Lightweight Secure Container Runtime for High-density Deployment
                  and High-concurrency Startup in Serverless Computing},
  booktitle    = {Proceedings of the 2022 {USENIX} Annual Technical Conference, {USENIX}
                  {ATC} 2022, Carlsbad, CA, USA, July 11-13, 2022},
  pages        = {53--68},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/atc22/presentation/li-zijun-rund},
  timestamp    = {Tue, 16 Jul 2024 09:12:32 +0200},
  biburl       = {https://dblp.org/rec/conf/usenix/LiC0GBTZWHG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wocc/JiDWQS22,
  author       = {Guangyuan Ji and
                  Minghui Dai and
                  Yuan Wu and
                  Li Ping Qian and
                  Zhou Su},
  title        = {Non-Orthogonal Multiple Access Assisted Secure Dual-UAV Mobile Edge
                  Computing Networks},
  booktitle    = {31st Wireless and Optical Communications Conference, {WOCC} 2022,
                  Shenzhen, China, August 11-12, 2022},
  pages        = {144--150},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/WOCC55104.2022.9880569},
  doi          = {10.1109/WOCC55104.2022.9880569},
  timestamp    = {Thu, 29 Sep 2022 21:52:19 +0200},
  biburl       = {https://dblp.org/rec/conf/wocc/JiDWQS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2022,
  title        = {{IEEE} Intl. Conf. on Dependable, Autonomic and Secure Computing,
                  Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud
                  and Big Data Computing, Intl Conf on Cyber Science and Technology
                  Congress, DASC/PiCom/CBDCom/CyberSciTech 2022, Falerna, Italy, September
                  12-15, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy55231.2022},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CY55231.2022},
  isbn         = {978-1-6654-6297-6},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/desec/2022,
  title        = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2022,
                  Edinburgh, UK, June 22-24, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC54232.2022},
  doi          = {10.1109/DSC54232.2022},
  isbn         = {978-1-6654-2141-6},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/Madani22,
  author       = {Omid Madani},
  title        = {Cisco Secure Workload Networks of Computing Hosts},
  publisher    = {{UCI} Machine Learning Repository},
  year         = {2022},
  month        = may,
  howpublished = {\url{https://doi.org/10.24432/C51K7Q}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.24432/C51K7Q},
  doi          = {10.24432/C51K7Q},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/data/10/Madani22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-00484,
  author       = {Hisham A. Kholidy and
                  Mohammad Ashiqur Rahman and
                  Andrew Karam and
                  Zahid Akhtar},
  title        = {Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based
                  Decentralized Trusted Computing Platform},
  journal      = {CoRR},
  volume       = {abs/2201.00484},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.00484},
  eprinttype    = {arXiv},
  eprint       = {2201.00484},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-00484.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-04816,
  author       = {Hendrik F. R. Schmidt and
                  J{\"{o}}rg Schl{\"{o}}tterer and
                  Marcel Bargull and
                  Enrico Nasca and
                  Ryan Aydelott and
                  Christin Seifert and
                  Folker Meyer},
  title        = {Towards a trustworthy, secure and reliable enclave for machine learning
                  in a hospital setting: The Essen Medical Computing Platform {(EMCP)}},
  journal      = {CoRR},
  volume       = {abs/2201.04816},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.04816},
  eprinttype    = {arXiv},
  eprint       = {2201.04816},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-04816.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-03134,
  author       = {Farid Sorouri},
  title        = {Edge-computing Enabled Next Generation Wireless Networks: {A} Novel
                  Approach to Provide Secure Multicast Services},
  journal      = {CoRR},
  volume       = {abs/2202.03134},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.03134},
  eprinttype    = {arXiv},
  eprint       = {2202.03134},
  timestamp    = {Wed, 09 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-03134.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-02833,
  author       = {Maximilian Lam and
                  Michael Mitzenmacher and
                  Vijay Janapa Reddi and
                  Gu{-}Yeon Wei and
                  David Brooks},
  title        = {Tabula: Efficiently Computing Nonlinear Activation Functions for Secure
                  Neural Network Inference},
  journal      = {CoRR},
  volume       = {abs/2203.02833},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.02833},
  doi          = {10.48550/ARXIV.2203.02833},
  eprinttype    = {arXiv},
  eprint       = {2203.02833},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-02833.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-06349,
  author       = {Matteo Marcantoni and
                  Bayu Jayawardhana and
                  Mariano Perez Chaher and
                  Kerstin Bunte},
  title        = {Secure Formation Control via Edge Computing Enabled by Fully Homomorphic
                  Encryption and Mixed Uniform-Logarithmic Quantization},
  journal      = {CoRR},
  volume       = {abs/2204.06349},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.06349},
  doi          = {10.48550/ARXIV.2204.06349},
  eprinttype    = {arXiv},
  eprint       = {2204.06349},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-06349.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-14498,
  author       = {Minhui Zou and
                  Junlong Zhou and
                  Xiaotong Cui and
                  Wei Wang and
                  Shahar Kvatinsky},
  title        = {Enhancing Security of Memristor Computing System Through Secure Weight
                  Mapping},
  journal      = {CoRR},
  volume       = {abs/2206.14498},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.14498},
  doi          = {10.48550/ARXIV.2206.14498},
  eprinttype    = {arXiv},
  eprint       = {2206.14498},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-14498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-06433,
  author       = {Tosin Ige and
                  Sikiru Adewale},
  title        = {Implementation of Data Mining on a Secure Cloud Computing over a Web
                  {API} using Supervised Machine Learning Algorithm},
  journal      = {CoRR},
  volume       = {abs/2208.06433},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.06433},
  doi          = {10.48550/ARXIV.2208.06433},
  eprinttype    = {arXiv},
  eprint       = {2208.06433},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-06433.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-09030,
  author       = {Xuewei Ma and
                  Wenyuan Yang and
                  Yuesheng Zhu and
                  Zhiqiang Bai},
  title        = {A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership
                  Management in Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/2208.09030},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.09030},
  doi          = {10.48550/ARXIV.2208.09030},
  eprinttype    = {arXiv},
  eprint       = {2208.09030},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-09030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-10027,
  author       = {P. Srikanth and
                  Adarsh Kumar},
  title        = {Secure Quantum Computing for Healthcare Sector: {A} Short Analysis},
  journal      = {CoRR},
  volume       = {abs/2211.10027},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.10027},
  doi          = {10.48550/ARXIV.2211.10027},
  eprinttype    = {arXiv},
  eprint       = {2211.10027},
  timestamp    = {Thu, 24 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-10027.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/Hrda22,
  author       = {Barbora Hrd{\'{a}}},
  title        = {Confidential Quantum Computing: Towards a Secure Computation on Untrusted
                  Quantum Servers},
  journal      = {{ERCIM} News},
  volume       = {2022},
  number       = {128},
  year         = {2022},
  url          = {https://ercim-news.ercim.eu/en128/special/confidential-quantum-computing-towards-a-secure-computation-on-untrusted-quantum-servers},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ercim/Hrda22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ArifASS22,
  title        = {Secure and Energy-Efficient Computational Offloading Using {LSTM}
                  in Mobile Edge Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2022},
  pages        = {4937588:1--4937588:13},
  year         = {2022},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1155/2022/4937588},
  doi          = {10.1155/2022/4937588},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ArifASS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Aldawood21,
  author       = {Mansour Aldawood},
  title        = {Secure virtual machines allocation in cloud computing environments},
  school       = {University of Warwick, Coventry, {UK}},
  year         = {2021},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.856334},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Aldawood21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/gr/Stergiou21,
  author       = {Christos Stergiou},
  title        = {Efficient and secure algorithms for big data handling, processing,
                  and delivery in cloud computing for Internet of Things networks},
  school       = {University of Macedonia, Thessaloniki, Greece},
  year         = {2021},
  url          = {http://hdl.handle.net/10442/hedi/49447},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/gr/Stergiou21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChenHW21,
  author       = {Wen{-}Chin Chen and
                  Yin{-}Tzu Huang and
                  Sheng{-}De Wang},
  title        = {Provable Secure Group Key Establishment Scheme for Fog Computing},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {158682--158694},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3130471},
  doi          = {10.1109/ACCESS.2021.3130471},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChenHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DewantaM21,
  author       = {Favian Dewanta and
                  Masahiro Mambo},
  title        = {Corrections to "A Mutual Authentication Scheme for Secure Fog Computing
                  Service Handover in Vehicular Network Environment"},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {143592},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3121106},
  doi          = {10.1109/ACCESS.2021.3121106},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/DewantaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DinWZA21,
  author       = {Nizamud Din and
                  Abdul Waheed and
                  Mahdi Zareei and
                  Faisal S. Alanazi},
  title        = {An Improved Identity-Based Generalized Signcryption Scheme for Secure
                  Multi-Access Edge Computing Empowered Flying Ad Hoc Networks},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {120704--120714},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3108130},
  doi          = {10.1109/ACCESS.2021.3108130},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DinWZA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GMKKN21,
  author       = {P. G. Shynu and
                  Varun G. Menon and
                  R. Lakshmana Kumar and
                  Seifedine Nimer Kadry and
                  Yunyoung Nam},
  title        = {Blockchain-Based Secure Healthcare Application for Diabetic-Cardio
                  Disease Prediction in Fog Computing},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {45706--45720},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3065440},
  doi          = {10.1109/ACCESS.2021.3065440},
  timestamp    = {Thu, 18 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GMKKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/KhanKKAKZKI21,
  author       = {Abudul Wahid Khan and
                  Maseeh Ullah Khan and
                  Javed Ali Khan and
                  Arshad Ahmad and
                  Khalil Khan and
                  Muhammad Zamir and
                  Wonjoon Kim and
                  Muhammad Fazal Ijaz},
  title        = {Analyzing and Evaluating Critical Challenges and Practices for Software
                  Vendor Organizations to Secure Big Data on Cloud Computing: An AHP-Based
                  Systematic Approach},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {107309--107332},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3100287},
  doi          = {10.1109/ACCESS.2021.3100287},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/KhanKKAKZKI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaherN21,
  author       = {Reda Maher and
                  Omar A. Nasr},
  title        = {DropStore: {A} Secure Backup System Using Multi-Cloud and Fog Computing},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {71318--71327},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3078887},
  doi          = {10.1109/ACCESS.2021.3078887},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaherN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/NijimA21,
  author       = {Mais Nijim and
                  Hisham Albataineh},
  title        = {Secure-Stor: {A} Novel Hybrid Storage System Architecture to Enhance
                  Security and Performance in Edge Computing},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {92446--92459},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3092732},
  doi          = {10.1109/ACCESS.2021.3092732},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/NijimA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WengLCLD21,
  author       = {Chi{-}Yao Weng and
                  Chun{-}Ta Li and
                  Chin{-}Ling Chen and
                  Cheng{-}Chi Lee and
                  Yong{-}Yuan Deng},
  title        = {A Lightweight Anonymous Authentication and Secure Communication Scheme
                  for Fog Computing Services},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {145522--145537},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3123234},
  doi          = {10.1109/ACCESS.2021.3123234},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WengLCLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangS21a,
  author       = {Xingjun Zhang and
                  Wei Si},
  title        = {Efficient Auditing Scheme for Secure Data Storage in Fog-to-Cloud
                  Computing},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {37951--37960},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2020.2971630},
  doi          = {10.1109/ACCESS.2020.2971630},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/SauberESAH21,
  author       = {Amr M. Sauber and
                  Passent Mohammed El{-}Kafrawy and
                  Amr F. Shawish and
                  Mohamed Amin and
                  Ismail M. Hagag},
  title        = {A New Secure Model for Data Protection over Cloud Computing},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2021},
  pages        = {8113253:1--8113253:11},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8113253},
  doi          = {10.1155/2021/8113253},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cin/SauberESAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cin/SiamAAEBSEE21,
  author       = {Ali I. Siam and
                  Mohammed Amin Almaiah and
                  Ali Al{-}Zahrani and
                  Atef Abou Elazm and
                  Ghada M. El Banby and
                  Walid El Shafai and
                  Fathi E. Abd El{-}Samie and
                  Nirmeen A. El{-}Bahnasawy},
  title        = {Secure Health Monitoring Communication Systems Based on IoT and Cloud
                  Computing for Medical Emergency Applications},
  journal      = {Comput. Intell. Neurosci.},
  volume       = {2021},
  pages        = {8016525:1--8016525:23},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8016525},
  doi          = {10.1155/2021/8016525},
  timestamp    = {Wed, 08 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cin/SiamAAEBSEE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AliCMGLZ21,
  author       = {Zeeshan Ali and
                  Shehzad Ashraf Chaudhry and
                  Khalid Mahmood and
                  Sahil Garg and
                  Zhihan Lv and
                  Yousaf Bin Zikria},
  title        = {A clogging resistant secure authentication scheme for fog computing
                  services},
  journal      = {Comput. Networks},
  volume       = {185},
  pages        = {107731},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2020.107731},
  doi          = {10.1016/J.COMNET.2020.107731},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AliCMGLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AmanlouHB21,
  author       = {Sanaz Amanlou and
                  Mohammad Kamrul Hasan and
                  Khairul Azmi Abu Bakar},
  title        = {Lightweight and secure authentication scheme for IoT network based
                  on publish-subscribe fog computing model},
  journal      = {Comput. Networks},
  volume       = {199},
  pages        = {108465},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.comnet.2021.108465},
  doi          = {10.1016/J.COMNET.2021.108465},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AmanlouHB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/complexity/ShiZWHW21,
  author       = {Minyu Shi and
                  Yongting Zhang and
                  Huanhuan Wang and
                  Junfeng Hu and
                  Xiang Wu},
  title        = {A Clonal Selection Optimization System for Multiparty Secure Computing},
  journal      = {Complex.},
  volume       = {2021},
  pages        = {7638394:1--7638394:14},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/7638394},
  doi          = {10.1155/2021/7638394},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/complexity/ShiZWHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KalariaKRP21,
  author       = {Rudri Kalaria and
                  A. S. M. Kayes and
                  Wenny Rahayu and
                  Eric Pardede},
  title        = {A Secure Mutual authentication approach to fog computing environment},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102483},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102483},
  doi          = {10.1016/J.COSE.2021.102483},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KalariaKRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/BocciFFB21,
  author       = {Alessandro Bocci and
                  Stefano Forti and
                  Gian{-}Luigi Ferrari and
                  Antonio Brogi},
  title        = {Secure FaaS orchestration in the fog: how far are we?},
  journal      = {Computing},
  volume       = {103},
  number       = {5},
  pages        = {1025--1056},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00607-021-00924-y},
  doi          = {10.1007/S00607-021-00924-Y},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/BocciFFB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/MerzougMGD21,
  author       = {Mohammed Amine Merzoug and
                  Ahmed Mostefaoui and
                  Gabriele Gianini and
                  Ernesto Damiani},
  title        = {Smart connected parking lots based on secured multimedia IoT devices},
  journal      = {Computing},
  volume       = {103},
  number       = {6},
  pages        = {1143--1164},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00607-021-00921-1},
  doi          = {10.1007/S00607-021-00921-1},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/MerzougMGD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/YakubuKJK21,
  author       = {Bello Musa Yakubu and
                  Majid I. Khan and
                  Nadeem Javaid and
                  Abid Khan},
  title        = {Blockchain-based secure multi-resource trading model for smart marketplace},
  journal      = {Computing},
  volume       = {103},
  number       = {3},
  pages        = {379--400},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00607-020-00886-7},
  doi          = {10.1007/S00607-020-00886-7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computing/YakubuKJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KolodziejJ21,
  author       = {Joanna Kolodziej and
                  Martin Gilje Jaatun},
  title        = {Secure mobile cloud computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {33},
  number       = {18},
  year         = {2021},
  url          = {https://doi.org/10.1002/cpe.6528},
  doi          = {10.1002/CPE.6528},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/KolodziejJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dmaa/Poureidi21,
  author       = {Abolfazl Poureidi},
  title        = {On computing secure domination of trees},
  journal      = {Discret. Math. Algorithms Appl.},
  volume       = {13},
  number       = {5},
  pages        = {2150055:1--2150055:15},
  year         = {2021},
  url          = {https://doi.org/10.1142/S1793830921500555},
  doi          = {10.1142/S1793830921500555},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dmaa/Poureidi21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/ChenHWKW21,
  author       = {Chien{-}Ming Chen and
                  Yanyu Huang and
                  King{-}Hang Wang and
                  Saru Kumari and
                  Mu{-}En Wu},
  title        = {A secure authenticated and key exchange scheme for fog computing},
  journal      = {Enterp. Inf. Syst.},
  volume       = {15},
  number       = {9},
  pages        = {1200--1215},
  year         = {2021},
  url          = {https://doi.org/10.1080/17517575.2020.1712746},
  doi          = {10.1080/17517575.2020.1712746},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eis/ChenHWKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/ZhangPWJSC21,
  author       = {Lejun Zhang and
                  Minghui Peng and
                  Weizheng Wang and
                  Zilong Jin and
                  Yansen Su and
                  Huiling Chen},
  title        = {Secure and efficient data storage and sharing scheme for blockchain-based
                  mobile-edge computing},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {32},
  number       = {10},
  year         = {2021},
  url          = {https://doi.org/10.1002/ett.4315},
  doi          = {10.1002/ETT.4315},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/ZhangPWJSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaip/AgarwalRP21,
  author       = {Neha Agarwal and
                  Ajay Rana and
                  Jai Prakash Pandey},
  title        = {An efficient and optimised approach for secured file sharing in cloud
                  computing},
  journal      = {Int. J. Adv. Intell. Paradigms},
  volume       = {18},
  number       = {2},
  pages        = {232--246},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJAIP.2021.112905},
  doi          = {10.1504/IJAIP.2021.112905},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaip/AgarwalRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/SubarajaSKJ21,
  author       = {S. Kanaga Subaraja and
                  A. Sathya and
                  S. Karthikeyan and
                  T. Janane},
  title        = {Multi cloud-based secure privacy preservation of hospital data in
                  cloud computing},
  journal      = {Int. J. Cloud Comput.},
  volume       = {10},
  number       = {1/2},
  pages        = {101--111},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJCC.2021.113993},
  doi          = {10.1504/IJCC.2021.113993},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcc/SubarajaSKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/KumarAKKK21,
  author       = {Vinod Kumar and
                  Musheer Ahmad and
                  Adesh Kumari and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {{SEBAP:} {A} secure and efficient biometric-assisted authentication
                  protocol using {ECC} for vehicular cloud computing},
  journal      = {Int. J. Commun. Syst.},
  volume       = {34},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/dac.4103},
  doi          = {10.1002/DAC.4103},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/KumarAKKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/SukumaranM21,
  author       = {Sreeja Cherillath Sukumaran and
                  Mohammed Misbahuddin},
  title        = {Secure key exchange scheme: a {DNA} computing-based approach to resist
                  {MITM} in {DHKE}},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {16},
  number       = {3/4},
  pages        = {307--323},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJICS.2021.118955},
  doi          = {10.1504/IJICS.2021.118955},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/SukumaranM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijmcmc/LiuWCTZ21,
  author       = {Jiasen Liu and
                  Xu An Wang and
                  Bowei Chen and
                  Zheng Tu and
                  Kaiyang Zhao},
  title        = {Outsourced Secure Face Recognition Based on {CKKS} Homomorphic Encryption
                  in Cloud Computing},
  journal      = {Int. J. Mob. Comput. Multim. Commun.},
  volume       = {12},
  number       = {3},
  pages        = {27--43},
  year         = {2021},
  url          = {https://doi.org/10.4018/ijmcmc.2021070103},
  doi          = {10.4018/IJMCMC.2021070103},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijmcmc/LiuWCTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpcc/Vaithyasubramanian21,
  author       = {S. Vaithyasubramanian and
                  R. Sundararajan},
  title        = {State space classification of Markov password - an alphanumeric password
                  authentication scheme for secure communication in cloud computing},
  journal      = {Int. J. Pervasive Comput. Commun.},
  volume       = {17},
  number       = {1},
  pages        = {121--134},
  year         = {2021},
  url          = {https://doi.org/10.1108/IJPCC-05-2020-0035},
  doi          = {10.1108/IJPCC-05-2020-0035},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpcc/Vaithyasubramanian21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/BoudiaS21,
  author       = {Omar Rafik Merad Boudia and
                  Sidi Mohammed Senouci},
  title        = {An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based
                  Smart Grid},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {8},
  pages        = {6143--6153},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3040982},
  doi          = {10.1109/JIOT.2020.3040982},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/BoudiaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GaoLCL21,
  author       = {Ying Gao and
                  Hongliang Lin and
                  Yijian Chen and
                  Yangliang Liu},
  title        = {Blockchain and SGX-Enabled Edge-Computing-Empowered Secure IoMT Data
                  Analysis},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {21},
  pages        = {15785--15795},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2021.3052604},
  doi          = {10.1109/JIOT.2021.3052604},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/GaoLCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/GroverACSC21,
  author       = {Harsh Grover and
                  Tejasvi Alladi and
                  Vinay Chamola and
                  Dheerendra Singh and
                  Kim{-}Kwang Raymond Choo},
  title        = {Edge Computing and Deep Learning Enabled Secure Multitier Network
                  for Internet of Vehicles},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {19},
  pages        = {14787--14796},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2021.3071362},
  doi          = {10.1109/JIOT.2021.3071362},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/GroverACSC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HassijaCKKG21,
  author       = {Vikas Hassija and
                  Vinay Chamola and
                  Dara Nanda Gopala Krishna and
                  Neeraj Kumar and
                  Mohsen Guizani},
  title        = {A Blockchain and Edge-Computing-Based Secure Framework for Government
                  Tender Allocation},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {4},
  pages        = {2409--2418},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3027070},
  doi          = {10.1109/JIOT.2020.3027070},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/HassijaCKKG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KimHLJLK21,
  author       = {Bongjun Kim and
                  Seonyeong Heo and
                  Jaeho Lee and
                  Shinnung Jeong and
                  Yongwoo Lee and
                  Hanjun Kim},
  title        = {Compiler-Assisted Semantic-Aware Encryption for Efficient and Secure
                  Serverless Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {7},
  pages        = {5645--5656},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3031550},
  doi          = {10.1109/JIOT.2020.3031550},
  timestamp    = {Thu, 28 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/KimHLJLK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiZJYXZ21,
  author       = {Yong Li and
                  Yipeng Zhou and
                  Alireza Jolfaei and
                  Dongjin Yu and
                  Gaochao Xu and
                  Xi Zheng},
  title        = {Privacy-Preserving Federated Learning Framework Based on Chained Secure
                  Multiparty Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {8},
  pages        = {6178--6186},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3022911},
  doi          = {10.1109/JIOT.2020.3022911},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiZJYXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuFPCMSD21,
  author       = {Lei Liu and
                  Jie Feng and
                  Qingqi Pei and
                  Chen Chen and
                  Yang Ming and
                  Bodong Shang and
                  Mianxiong Dong},
  title        = {Blockchain-Enabled Secure Data Sharing Scheme in Mobile-Edge Computing:
                  An Asynchronous Advantage Actor-Critic Learning Approach},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {4},
  pages        = {2342--2353},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3048345},
  doi          = {10.1109/JIOT.2020.3048345},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuFPCMSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WuDW21,
  author       = {Yulei Wu and
                  Hong{-}Ning Dai and
                  Hao Wang},
  title        = {Convergence of Blockchain and Edge Computing for Secure and Scalable
                  IIoT Critical Infrastructures in Industry 4.0},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {4},
  pages        = {2300--2317},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3025916},
  doi          = {10.1109/JIOT.2020.3025916},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WuDW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangEHIDGE21,
  author       = {Weizhe Zhang and
                  Ibrahim A. Elgendy and
                  Mohamed Hammad and
                  Abdullah M. Iliyasu and
                  Xiaojiang Du and
                  Mohsen Guizani and
                  Ahmed A. Abd El{-}Latif},
  title        = {Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud
                  Computing Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {10},
  pages        = {8119--8132},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3042433},
  doi          = {10.1109/JIOT.2020.3042433},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangEHIDGE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/WazidBDGNH21,
  author       = {Mohammad Wazid and
                  Basudeb Bera and
                  Ashok Kumar Das and
                  Sahil Garg and
                  Dusit Niyato and
                  M. Shamim Hossain},
  title        = {Secure Communication Framework for Blockchain-Based Internet of Drones-Enabled
                  Aerial Computing Deployment},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {4},
  number       = {3},
  pages        = {120--126},
  year         = {2021},
  url          = {https://doi.org/10.1109/IOTM.1001.2100047},
  doi          = {10.1109/IOTM.1001.2100047},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/WazidBDGNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/YangWWWZL21,
  author       = {Qing Yang and
                  Hao Wang and
                  Xiaoxiao Wu and
                  Taotao Wang and
                  Shengli Zhang and
                  Naijin Liu},
  title        = {Secure Blockchain Platform for Industrial IoT with Trusted Computing
                  Hardware},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {4},
  number       = {4},
  pages        = {86--92},
  year         = {2021},
  url          = {https://doi.org/10.1109/IOTM.001.2100043},
  doi          = {10.1109/IOTM.001.2100043},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/YangWWWZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isi/SheetalLGN21,
  author       = {Annabathula Phani Sheetal and
                  Giddaluru Lalitha and
                  Arepalli Peda Gopi and
                  Vejendla Lakshman Narayana},
  title        = {Secured Data Transmission with Integrated Fault Reduction Scheduling
                  in Cloud Computing},
  journal      = {Ing{\'{e}}nierie des Syst{\`{e}}mes d Inf.},
  volume       = {26},
  number       = {2},
  pages        = {225--230},
  year         = {2021},
  url          = {https://doi.org/10.18280/isi.260209},
  doi          = {10.18280/ISI.260209},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isi/SheetalLGN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/LinWGY21,
  author       = {Yijian Lin and
                  Xiaoming Wang and
                  Qingqing Gan and
                  Mengting Yao},
  title        = {A secure cross-domain authentication scheme with perfect forward security
                  and complete anonymity in fog computing},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {63},
  pages        = {103022},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jisa.2021.103022},
  doi          = {10.1016/J.JISA.2021.103022},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/LinWGY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/TiwariG21,
  author       = {Deepnarayan Tiwari and
                  G. R. Gangadharan},
  title        = {SecAuth-SaaS: a hierarchical certificateless aggregate signature for
                  secure collaborative SaaS authentication in cloud computing},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {12},
  pages        = {10539--10563},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12652-020-02864-5},
  doi          = {10.1007/S12652-020-02864-5},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/TiwariG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaise/MansoorV21,
  author       = {Wathiq Mansoor and
                  Varadarajan Vijayakumar},
  title        = {Trustworthy computing for secure smart cities},
  journal      = {J. Ambient Intell. Smart Environ.},
  volume       = {13},
  number       = {3},
  pages        = {183--184},
  year         = {2021},
  url          = {https://doi.org/10.3233/AIS-210597},
  doi          = {10.3233/AIS-210597},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaise/MansoorV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/MinKLM21,
  author       = {Jie Min and
                  Xiaoyan Kui and
                  Junbin Liang and
                  Xingpo Ma},
  title        = {Secure Top-k query in edge-computing-assisted sensor-cloud systems},
  journal      = {J. Syst. Archit.},
  volume       = {119},
  pages        = {102244},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.sysarc.2021.102244},
  doi          = {10.1016/J.SYSARC.2021.102244},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/MinKLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsait/YangA21,
  author       = {Chien{-}Sheng Yang and
                  Amir Salman Avestimehr},
  title        = {Coded Computing for Secure Boolean Computations},
  journal      = {{IEEE} J. Sel. Areas Inf. Theory},
  volume       = {2},
  number       = {1},
  pages        = {326--337},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSAIT.2021.3055341},
  doi          = {10.1109/JSAIT.2021.3055341},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsait/YangA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/ChangLCQ21,
  author       = {Dajun Chang and
                  Li Li and
                  Ying Chang and
                  Zhangquan Qiao},
  title        = {Cloud Computing Storage Backup and Recovery Strategy Based on Secure
                  IoT and Spark},
  journal      = {Mob. Inf. Syst.},
  volume       = {2021},
  pages        = {9505249:1--9505249:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/9505249},
  doi          = {10.1155/2021/9505249},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mis/ChangLCQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/RiveraRH21,
  author       = {Angelo Vera Rivera and
                  Ahmed Refaey and
                  Ekram Hossain},
  title        = {A Blockchain Framework for Secure Task Sharing in Multi-Access Edge
                  Computing},
  journal      = {{IEEE} Netw.},
  volume       = {35},
  number       = {3},
  pages        = {176--183},
  year         = {2021},
  url          = {https://doi.org/10.1109/MNET.011.2000497},
  doi          = {10.1109/MNET.011.2000497},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/RiveraRH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/AmosLWW21,
  author       = {Peprah Amos and
                  Pei Li and
                  Wei Wu and
                  Baoyun Wang},
  title        = {Computation efficiency maximization for secure UAV-enabled mobile
                  edge computing networks},
  journal      = {Phys. Commun.},
  volume       = {46},
  pages        = {101284},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.phycom.2021.101284},
  doi          = {10.1016/J.PHYCOM.2021.101284},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/phycomm/AmosLWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/LaiZTXZF21,
  author       = {Shiwei Lai and
                  Rui Zhao and
                  Shunpu Tang and
                  Junjuan Xia and
                  Fasheng Zhou and
                  Liseng Fan},
  title        = {Intelligent secure mobile edge computing for beyond 5G wireless networks},
  journal      = {Phys. Commun.},
  volume       = {45},
  pages        = {101283},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.phycom.2021.101283},
  doi          = {10.1016/J.PHYCOM.2021.101283},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/phycomm/LaiZTXZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/GawasPG21,
  author       = {Mahadev A. Gawas and
                  Hemprasad Yashwant Patil and
                  Sweta S. Govekar},
  title        = {An integrative approach for secure data sharing in vehicular edge
                  computing using Blockchain},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {5},
  pages        = {2840--2857},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-021-01107-4},
  doi          = {10.1007/S12083-021-01107-4},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/GawasPG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CuiFL21,
  author       = {Mengmeng Cui and
                  Yiming Fei and
                  Yin Liu},
  title        = {A Survey on Secure Deployment of Mobile Services in Edge Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {8846239:1--8846239:8},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8846239},
  doi          = {10.1155/2021/8846239},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CuiFL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FengWLF21,
  author       = {Tao Feng and
                  Xusheng Wang and
                  Chunyan Liu and
                  Junli Fang},
  title        = {Secure Data Collaborative Computing Scheme Based on Blockchain},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6630291:1--6630291:9},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6630291},
  doi          = {10.1155/2021/6630291},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FengWLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GuoS21a,
  author       = {Jingjing Guo and
                  Jiacong Sun},
  title        = {Secure and Practical Group Nearest Neighbor Query for Location-Based
                  Services in Cloud Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {5686506:1--5686506:17},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/5686506},
  doi          = {10.1155/2021/5686506},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/GuoS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ParkS21a,
  author       = {BoSun Park and
                  Seog Chung Seo},
  title        = {Efficient Implementation of {NIST} {LWC} {ESTATE} Algorithm Using
                  OpenCL and Web Assembly for Secure Communication in Edge Computing
                  Environment},
  journal      = {Sensors},
  volume       = {21},
  number       = {6},
  pages        = {1987},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21061987},
  doi          = {10.3390/S21061987},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/ParkS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/DharminderOMD21,
  author       = {Dharminder Dharminder and
                  Mohammad S. Obaidat and
                  Dheerendra Mishra and
                  Ashok Kumar Das},
  title        = {{SFEEC:} Provably Secure Signcryption-Based Big Data Security Framework
                  for Energy-Efficient Computing Environment},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {1},
  pages        = {598--606},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.2978015},
  doi          = {10.1109/JSYST.2020.2978015},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/DharminderOMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LiCLL21,
  author       = {Yuting Li and
                  Qingfeng Cheng and
                  Ximeng Liu and
                  Xinghua Li},
  title        = {A Secure Anonymous Identity-Based Scheme in New Authentication Architecture
                  for Mobile Edge Computing},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {1},
  pages        = {935--946},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.2979006},
  doi          = {10.1109/JSYST.2020.2979006},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/LiCLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soca/BenifaG21,
  author       = {J. V. Bibal Benifa and
                  Venifa Mini G},
  title        = {Modified Chebyshev polynomial-based access control mechanism for secured
                  data access in cloud computing environment},
  journal      = {Serv. Oriented Comput. Appl.},
  volume       = {15},
  number       = {3},
  pages        = {187--203},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11761-020-00307-9},
  doi          = {10.1007/S11761-020-00307-9},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soca/BenifaG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/GoumidiHAG21,
  author       = {Hadjer Goumidi and
                  Saad Harous and
                  Zibouda Aliouat and
                  Abdelhak Mourad Gu{\'{e}}roui},
  title        = {Lightweight Secure Authentication and Key Distribution Scheme for
                  Vehicular Cloud Computing},
  journal      = {Symmetry},
  volume       = {13},
  number       = {3},
  pages        = {484},
  year         = {2021},
  url          = {https://doi.org/10.3390/sym13030484},
  doi          = {10.3390/SYM13030484},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/GoumidiHAG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/000921,
  author       = {Lei Zhang},
  title        = {Key Management Scheme for Secure Channel Establishment in Fog Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {3},
  pages        = {1117--1128},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2019.2903254},
  doi          = {10.1109/TCC.2019.2903254},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/000921.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ElgendyZLH21,
  author       = {Ibrahim A. Elgendy and
                  Weizhe Zhang and
                  Chuan{-}Yi Liu and
                  Ching{-}Hsien Hsu},
  title        = {An Efficient and Secured Framework for Mobile Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {1},
  pages        = {79--87},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2018.2847347},
  doi          = {10.1109/TCC.2018.2847347},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/ElgendyZLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ElgendyZLH21a,
  author       = {Ibrahim A. Elgendy and
                  Weizhe Zhang and
                  Chuan{-}Yi Liu and
                  Ching{-}Hsien Hsu},
  title        = {Correction to "An Efficient and Secured Framework For Mobile Cloud
                  Computing"},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {2},
  pages        = {844},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2021.3066023},
  doi          = {10.1109/TCC.2021.3066023},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/ElgendyZLH21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/HuangYYH21,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Wei Yue and
                  Yue He},
  title        = {Secure Data Group Sharing and Conditional Dissemination with Multi-Owner
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {4},
  pages        = {1607--1618},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2019.2908163},
  doi          = {10.1109/TCC.2019.2908163},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/HuangYYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/YuA21,
  author       = {Qian Yu and
                  Amir Salman Avestimehr},
  title        = {Coded Computing for Resilient, Secure, and Privacy-Preserving Distributed
                  Matrix Multiplication},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {69},
  number       = {1},
  pages        = {59--72},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCOMM.2020.3032196},
  doi          = {10.1109/TCOMM.2020.3032196},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/YuA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/RuangwisesI21,
  author       = {Suthee Ruangwises and
                  Toshiya Itoh},
  title        = {Securely computing the \emph{n}-variable equality function with 2\emph{n}
                  cards},
  journal      = {Theor. Comput. Sci.},
  volume       = {887},
  pages        = {99--110},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.07.007},
  doi          = {10.1016/J.TCS.2021.07.007},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/RuangwisesI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ElrabaaAA21,
  author       = {Muhammad E. S. Elrabaa and
                  Mohammed Alasli and
                  Marwan H. Abu{-}Amara},
  title        = {Secure Computing Enclaves Using FPGAs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {593--604},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2933214},
  doi          = {10.1109/TDSC.2019.2933214},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ElrabaaAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GeSLXSF21,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Zhe Liu and
                  Jinyue Xia and
                  Pawel Szalachowski and
                  Liming Fang},
  title        = {Secure Keyword Search and Data Sharing Mechanism for Cloud Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2787--2800},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.2963978},
  doi          = {10.1109/TDSC.2020.2963978},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/GeSLXSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HongINS21,
  author       = {Yuan Hong and
                  Val{\'{e}}rie Issarny and
                  Surya Nepal and
                  Mudhakar Srivatsa},
  title        = {Guest Editors' Introduction to the Joint Special Section on Secure
                  and Emerging Collaborative Computing and Intelligent Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1511--1512},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2021.3076120},
  doi          = {10.1109/TDSC.2021.3076120},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HongINS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiLGW21,
  author       = {Wei Li and
                  Xuelian Li and
                  Juntao Gao and
                  Haiyu Wang},
  title        = {Design of Secure Authenticated Key Management Protocol for Cloud Computing
                  Environments},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {3},
  pages        = {1276--1290},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2909890},
  doi          = {10.1109/TDSC.2019.2909890},
  timestamp    = {Thu, 20 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiLGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuWSYJCX21,
  author       = {Yulin Wu and
                  Xuan Wang and
                  Willy Susilo and
                  Guomin Yang and
                  Zoe Lin Jiang and
                  Qian Chen and
                  Peng Xu},
  title        = {Efficient Server-Aided Secure Two-Party Computation in Heterogeneous
                  Mobile Cloud Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2820--2834},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.2966632},
  doi          = {10.1109/TDSC.2020.2966632},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuWSYJCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/HongINS21,
  author       = {Yuan Hong and
                  Val{\'{e}}rie Issarny and
                  Surya Nepal and
                  Mudhakar Srivatsa},
  title        = {Guest Editors' Introduction to the Joint Special Section on Secure
                  and Emerging Collaborative Computing and Intelligent Systems},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {3},
  pages        = {1328--1329},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2021.3076338},
  doi          = {10.1109/TETC.2021.3076338},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/HongINS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/MendisWWSR21,
  author       = {Gihan J. Mendis and
                  Yifu Wu and
                  Jin Wei and
                  Moein Sabounchi and
                  Rigoberto Roche'},
  title        = {A Blockchain-Powered Decentralized and Secure Computing Paradigm},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {2201--2222},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2020.2983007},
  doi          = {10.1109/TETC.2020.2983007},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/MendisWWSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/KhanJRMAW21,
  author       = {Fazlullah Khan and
                  Mian Ahmad Jan and
                  Ateeq Ur Rehman and
                  Spyridon Mastorakis and
                  Mamoun Alazab and
                  Paul A. Watters},
  title        = {A Secured and Intelligent Communication Scheme for IIoT-enabled Pervasive
                  Edge Computing},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {7},
  pages        = {5128--5137},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3037872},
  doi          = {10.1109/TII.2020.3037872},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/KhanJRMAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LiMMLLC21,
  author       = {Yingying Li and
                  Jianfeng Ma and
                  Yinbin Miao and
                  Liming Liu and
                  Ximeng Liu and
                  Kim{-}Kwang Raymond Choo},
  title        = {Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge
                  Computing},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {8},
  pages        = {5348--5359},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3032147},
  doi          = {10.1109/TII.2020.3032147},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/LiMMLLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/PeiYWCWW21,
  author       = {Xinyue Pei and
                  Hua Yu and
                  Xiaojie Wang and
                  Yingyang Chen and
                  Miaowen Wen and
                  Yik{-}Chung Wu},
  title        = {NOMA-Based Pervasive Edge Computing: Secure Power Allocation for IoV},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {7},
  pages        = {5021--5030},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3001955},
  doi          = {10.1109/TII.2020.3001955},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/PeiYWCWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WangCHZG21,
  author       = {Xiaolin Wang and
                  Cailian Chen and
                  Jianping He and
                  Shanying Zhu and
                  Xinping Guan},
  title        = {Learning-Based Online Transmission Path Selection for Secure Estimation
                  in Edge Computing Systems},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {5},
  pages        = {3577--3587},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3012090},
  doi          = {10.1109/TII.2020.3012090},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/WangCHZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhangWHZXX21,
  author       = {Yushu Zhang and
                  Ping Wang and
                  Hui Huang and
                  Youwen Zhu and
                  Di Xiao and
                  Yong Xiang},
  title        = {Privacy-Assured FogCS: Chaotic Compressive Sensing for Secure Industrial
                  Big Image Data Processing in Fog Computing},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {5},
  pages        = {3401--3411},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3008914},
  doi          = {10.1109/TII.2020.3008914},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ZhangWHZXX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhangWTSX21,
  author       = {Tengyue Zhang and
                  Hong Wen and
                  Jie Tang and
                  Huanhuan Song and
                  FeiYi Xie},
  title        = {Cooperative Jamming Secure Scheme for IWNs Random Mobile Users Aided
                  by Edge Computing Intelligent Node Selection},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {7},
  pages        = {4999--5009},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2020.3017767},
  doi          = {10.1109/TII.2020.3017767},
  timestamp    = {Tue, 24 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/ZhangWTSX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LiaoMZSWP21,
  author       = {Haijun Liao and
                  Yansong Mu and
                  Zhenyu Zhou and
                  Meng Sun and
                  Zhao Wang and
                  Chao Pan},
  title        = {Blockchain and Learning-Based Secure and Intelligent Task Offloading
                  for Vehicular Fog Computing},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {7},
  pages        = {4051--4063},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.3007770},
  doi          = {10.1109/TITS.2020.3007770},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/LiaoMZSWP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/SharmaP21,
  author       = {Pradip Kumar Sharma and
                  Jong Hyuk Park},
  title        = {Blockchain-Based Secure Mist Computing Network Architecture for Intelligent
                  Transportation Systems},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {8},
  pages        = {5168--5177},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.3040989},
  doi          = {10.1109/TITS.2020.3040989},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/SharmaP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/XuHZSZQB21,
  author       = {Xiaolong Xu and
                  Qihe Huang and
                  Haibin Zhu and
                  Suraj Sharma and
                  Xuyun Zhang and
                  Lianyong Qi and
                  Md. Zakirul Alam Bhuiyan},
  title        = {Secure Service Offloading for Internet of Vehicles in SDN-Enabled
                  Mobile Edge Computing},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {6},
  pages        = {3720--3729},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.3034197},
  doi          = {10.1109/TITS.2020.3034197},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/XuHZSZQB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ChaLAKK21,
  author       = {Myung{-}Hoon Cha and
                  Sangmin Lee and
                  Baik{-}Song An and
                  Hong{-}Yeon Kim and
                  Kang{-}Ho Kim},
  title        = {Fast and secure Global-Heap for memory-centric computing},
  journal      = {J. Supercomput.},
  volume       = {77},
  number       = {11},
  pages        = {13262--13291},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11227-021-03806-4},
  doi          = {10.1007/S11227-021-03806-4},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ChaLAKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/HammamiYO21,
  author       = {Hamza Hammami and
                  Sadok Ben Yahia and
                  Mohammad S. Obaidat},
  title        = {A lightweight anonymous authentication scheme for secure cloud computing
                  services},
  journal      = {J. Supercomput.},
  volume       = {77},
  number       = {2},
  pages        = {1693--1713},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11227-020-03313-y},
  doi          = {10.1007/S11227-020-03313-Y},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/HammamiYO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/MansouriJZ21,
  author       = {Najme Mansouri and
                  Mohammad Masoud Javidi and
                  Behnam Mohammad Hasani Zade},
  title        = {A CSO-based approach for secure data replication in cloud computing
                  environment},
  journal      = {J. Supercomput.},
  volume       = {77},
  number       = {6},
  pages        = {5882--5933},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11227-020-03497-3},
  doi          = {10.1007/S11227-020-03497-3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/MansouriJZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HuangZY21,
  author       = {Qinlong Huang and
                  Zhicheng Zhang and
                  Yixian Yang},
  title        = {Privacy-Preserving Media Sharing with Scalable Access Control and
                  Secure Deduplication in Mobile Cloud Computing},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {1951--1964},
  year         = {2021},
  url          = {https://doi.org/10.1109/TMC.2020.2970705},
  doi          = {10.1109/TMC.2020.2970705},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/HuangZY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/WangYHYWZ21,
  author       = {Siming Wang and
                  Dongdong Ye and
                  Xumin Huang and
                  Rong Yu and
                  Yongjian Wang and
                  Yan Zhang},
  title        = {Consortium Blockchain for Secure Resource Sharing in Vehicular Edge
                  Computing: {A} Contract-Based Approach},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {1189--1201},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.3004475},
  doi          = {10.1109/TNSE.2020.3004475},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/WangYHYWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/XiaWTXW21,
  author       = {Zhihua Xia and
                  Lan Wang and
                  Jian Tang and
                  Neal N. Xiong and
                  Jian Weng},
  title        = {A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary
                  Pattern in Cloud Computing},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {318--330},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.3038218},
  doi          = {10.1109/TNSE.2020.3038218},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/XiaWTXW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/LiuCXY21,
  author       = {Xuejiao Liu and
                  Wei Chen and
                  Yingjie Xia and
                  Chenghan Yang},
  title        = {{SE-VFC:} Secure and Efficient Outsourcing Computing in Vehicular
                  Fog Computing},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {3},
  pages        = {3389--3399},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2021.3080138},
  doi          = {10.1109/TNSM.2021.3080138},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/LiuCXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/LiuPWWW21,
  author       = {Qin Liu and
                  Yu Peng and
                  Jie Wu and
                  Tian Wang and
                  Guojun Wang},
  title        = {Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {18},
  number       = {2},
  pages        = {2046--2062},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSM.2020.3045467},
  doi          = {10.1109/TNSM.2020.3045467},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/LiuPWWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/AlizadehTSAJ21,
  author       = {Mojtaba Alizadeh and
                  Mohammad Hesam Tadayon and
                  Kouichi Sakurai and
                  Hiroaki Anada and
                  Alireza Jolfaei},
  title        = {A Secure Ticket-Based Authentication Mechanism for Proxy Mobile IPv6
                  Networks in Volunteer Computing},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {21},
  number       = {4},
  pages        = {82:1--82:16},
  year         = {2021},
  url          = {https://doi.org/10.1145/3407189},
  doi          = {10.1145/3407189},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/AlizadehTSAJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/AsheralievaN21,
  author       = {Alia Asheralieva and
                  Dusit Niyato},
  title        = {Fast and Secure Computational Offloading With Lagrange Coded Mobile
                  Edge Computing},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {5},
  pages        = {4924--4942},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3070723},
  doi          = {10.1109/TVT.2021.3070723},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/AsheralievaN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LuoLCM21,
  author       = {Xuewen Luo and
                  Yiliang Liu and
                  Hsiao{-}Hwa Chen and
                  Weixiao Meng},
  title        = {Artificial Noise Assisted Secure Mobile Crowd Computing in Intelligently
                  Connected Vehicular Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {8},
  pages        = {7637--7651},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3087399},
  doi          = {10.1109/TVT.2021.3087399},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/LuoLCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/webology/AnoopS21a,
  author       = {S. Anoop and
                  J. Amar Pratap Singh},
  title        = {A {LSTM} Approach for Secure Energy Efficient Computational Offloading
                  in Mobile Edge Computing},
  journal      = {Webology},
  volume       = {18},
  number       = {2},
  pages        = {856--874},
  year         = {2021},
  url          = {https://doi.org/10.14704/web/v18i2/web18359},
  doi          = {10.14704/WEB/V18I2/WEB18359},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/webology/AnoopS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/webology/HassanAKSA21,
  author       = {Mohammad Hassan and
                  Feras A. Alnaimait and
                  Qasem Kharma and
                  Ashraf Sharah and
                  Khalil Al{-}Shqeerat},
  title        = {Secure Group Key Management Protocol for Grid Computing},
  journal      = {Webology},
  volume       = {18},
  number       = {2},
  pages        = {1055--1065},
  year         = {2021},
  url          = {https://doi.org/10.14704/web/v18i2/web18374},
  doi          = {10.14704/WEB/V18I2/WEB18374},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/webology/HassanAKSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wias/Wu21,
  author       = {Weiwei Wu},
  title        = {A secure encryption method of communication channel based on cloud
                  computing technology},
  journal      = {Web Intell.},
  volume       = {19},
  number       = {3},
  pages        = {239--251},
  year         = {2021},
  url          = {https://doi.org/10.3233/WEB-210470},
  doi          = {10.3233/WEB-210470},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wias/Wu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LeeKLW21,
  author       = {Hakjun Lee and
                  Dongwoo Kang and
                  Youngsook Lee and
                  Dongho Won},
  title        = {Secure Three-Factor Anonymous User Authentication Scheme for Cloud
                  Computing Environment},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {2098530:1--2098530:20},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/2098530},
  doi          = {10.1155/2021/2098530},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LeeKLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LuoWX21,
  author       = {Hongwei Luo and
                  Feifei Wang and
                  Guoai Xu},
  title        = {Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile
                  Cloud Computing with Offline Registration Centre},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2021},
  pages        = {8848032:1--8848032:12},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/8848032},
  doi          = {10.1155/2021/8848032},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LuoWX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/KimLC21,
  author       = {Hyeong{-}Jin Kim and
                  Hyeon{-}Jo Lee and
                  Jae{-}Woo Chang},
  editor       = {Herwig Unger and
                  Jinho Kim and
                  U Kang and
                  Chakchai So{-}In and
                  Junping Du and
                  Walid Saad and
                  Young{-}Guk Ha and
                  Christian Wagner and
                  Julien Bourgeois and
                  Chanboon Sathitwiriyawong and
                  Hyuk{-}Yoon Kwon and
                  Carson K. Leung},
  title        = {A Secure and Efficient Query Processing Algorithm Over Encrypted Database
                  in Cloud Computing},
  booktitle    = {{IEEE} International Conference on Big Data and Smart Computing, BigComp
                  2021, Jeju Island, South Korea, January 17-20, 2021},
  pages        = {219--225},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigComp51126.2021.00049},
  doi          = {10.1109/BIGCOMP51126.2021.00049},
  timestamp    = {Thu, 15 Jul 2021 15:42:38 +0200},
  biburl       = {https://dblp.org/rec/conf/bigcomp/KimLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/GrafbergerCJGG21,
  author       = {Andreas Grafberger and
                  Mohak Chadha and
                  Anshul Jindal and
                  Jianfeng Gu and
                  Michael Gerndt},
  editor       = {Yixin Chen and
                  Heiko Ludwig and
                  Yicheng Tu and
                  Usama M. Fayyad and
                  Xingquan Zhu and
                  Xiaohua Hu and
                  Suren Byna and
                  Xiong Liu and
                  Jianping Zhang and
                  Shirui Pan and
                  Vagelis Papalexakis and
                  Jianwu Wang and
                  Alfredo Cuzzocrea and
                  Carlos Ordonez},
  title        = {FedLess: Secure and Scalable Federated Learning Using Serverless Computing},
  booktitle    = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando,
                  FL, USA, December 15-18, 2021},
  pages        = {164--173},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigData52589.2021.9672067},
  doi          = {10.1109/BIGDATA52589.2021.9672067},
  timestamp    = {Fri, 13 Jan 2023 17:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/GrafbergerCJGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/case/GiehlHB21,
  author       = {Alexander Giehl and
                  Michael P. Heinl and
                  Maximilian Busch},
  title        = {Leveraging Edge Computing and Differential Privacy to Securely Enable
                  Industrial Cloud Collaboration Along the Value Chain},
  booktitle    = {17th {IEEE} International Conference on Automation Science and Engineering,
                  {CASE} 2021, Lyon, France, August 23-27, 2021},
  pages        = {2023--2028},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CASE49439.2021.9551656},
  doi          = {10.1109/CASE49439.2021.9551656},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/case/GiehlHB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccoms/ZhangFCLC21,
  author       = {Zheng Zhang and
                  Yongwei Fu and
                  Gang Cheng and
                  Xiaolong Lan and
                  Qingchun Chen},
  title        = {Secure Offloading Design in Multi-user Mobile-Edge Computing Systems},
  booktitle    = {6th {IEEE} International Conference on Computer and Communication
                  Systems, {ICCCS} 2021, Chengdu, China, April 23-26, 2021},
  pages        = {695--703},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCS52626.2021.9449190},
  doi          = {10.1109/ICCCS52626.2021.9449190},
  timestamp    = {Wed, 28 Jul 2021 08:35:29 +0200},
  biburl       = {https://dblp.org/rec/conf/ccoms/ZhangFCLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/AldawoodJF21a,
  author       = {Mansour Aldawood and
                  Arshad Jhumka and
                  Suhaib A. Fahmy},
  editor       = {Donald Ferguson and
                  Markus Helfert and
                  Claus Pahl},
  title        = {Toward Secure VMs Allocation: Analysis of VMs Allocation Behaviours
                  in the Cloud Computing Environments},
  booktitle    = {Cloud Computing and Services Science - 11th International Conference,
                  {CLOSER} 2021, Virtual Event, April 28-30, 2021, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1607},
  pages        = {25--46},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-21637-4\_2},
  doi          = {10.1007/978-3-031-21637-4\_2},
  timestamp    = {Tue, 07 Mar 2023 16:01:53 +0100},
  biburl       = {https://dblp.org/rec/conf/closer/AldawoodJF21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cogmi/SchmidtSBNASM21,
  author       = {Hendrik F. R. Schmidt and
                  J{\"{o}}rg Schl{\"{o}}tterer and
                  Marcel Bargull and
                  Enrico Nasca and
                  Ryan Aydelott and
                  Christin Seifert and
                  Folker Meyer},
  title        = {Towards a trustworthy, secure and reliable enclave for machine learning
                  in a hospital setting: The Essen Medical Computing Platform {(EMCP)}},
  booktitle    = {Third {IEEE} International Conference on Cognitive Machine Intelligence,
                  CogMI 2021, Atlanta, GA, USA, December 13-15, 2021},
  pages        = {116--123},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CogMI52975.2021.00023},
  doi          = {10.1109/COGMI52975.2021.00023},
  timestamp    = {Wed, 20 Apr 2022 16:01:05 +0200},
  biburl       = {https://dblp.org/rec/conf/cogmi/SchmidtSBNASM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/comsnets/SardarBRS21,
  author       = {Laltu Sardar and
                  Gaurav Bansal and
                  Sushmita Ruj and
                  Kouichi Sakurai},
  title        = {Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted
                  Graph Data},
  booktitle    = {13th International Conference on COMmunication Systems {\&} NETworkS,
                  {COMSNETS} 2021, Bangalore, India, January 5-9, 2021},
  pages        = {465--473},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/COMSNETS51098.2021.9352809},
  doi          = {10.1109/COMSNETS51098.2021.9352809},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/comsnets/SardarBRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BagheryGOST21,
  author       = {Karim Baghery and
                  Cyprien Delpech de Saint Guilhem and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Titouan Tanguy},
  editor       = {Kenneth G. Paterson},
  title        = {Compilation of Function Representations for Secure Computing Paradigms},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {26--50},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_2},
  doi          = {10.1007/978-3-030-75539-3\_2},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BagheryGOST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/DessoukyIKMMSSZ21,
  author       = {Ghada Dessouky and
                  Mihailo Isakov and
                  Michel A. Kinsy and
                  Pouya Mahmoody and
                  Miguel Mark and
                  Ahmad{-}Reza Sadeghi and
                  Emmanuel Stapf and
                  Shaza Zeitouni},
  title        = {Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based
                  Architectures},
  booktitle    = {58th {ACM/IEEE} Design Automation Conference, {DAC} 2021, San Francisco,
                  CA, USA, December 5-9, 2021},
  pages        = {985--990},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DAC18074.2021.9586222},
  doi          = {10.1109/DAC18074.2021.9586222},
  timestamp    = {Fri, 12 Nov 2021 12:31:50 +0100},
  biburl       = {https://dblp.org/rec/conf/dac/DessoukyIKMMSSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/YinZF21,
  author       = {Jiaqi Yin and
                  Huibiao Zhu and
                  Yuan Fei},
  title        = {{SC4MEC:} Automated Implementation of {A} Secure Hierarchical Calculus
                  for Mobile Edge Computing},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2021, Grenoble, France, February 1-5, 2021},
  pages        = {990--993},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/DATE51398.2021.9474184},
  doi          = {10.23919/DATE51398.2021.9474184},
  timestamp    = {Wed, 21 Jul 2021 10:04:34 +0200},
  biburl       = {https://dblp.org/rec/conf/date/YinZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/WuLDLZG21,
  author       = {Songqi Wu and
                  Jin Li and
                  Fenghui Duan and
                  Yueming Lu and
                  Xu Zhang and
                  Jiefu Gan},
  title        = {The Survey on the development of Secure Multi-Party Computing in the
                  blockchain},
  booktitle    = {Sixth {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2021, Shenzhen, China, October 9-11, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC53577.2021.00008},
  doi          = {10.1109/DSC53577.2021.00008},
  timestamp    = {Fri, 22 Apr 2022 19:18:38 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/WuLDLZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eucnc/RiggioCLJMGRSP21,
  author       = {Roberto Riggio and
                  Estefan{\'{\i}}a Coronado and
                  Neiva Linder and
                  Jovanka Adzic and
                  Gianpiero Mastinu and
                  Leonardo Goratti and
                  Miguel Rosa and
                  Hans D. Schotten and
                  Marco Pistore},
  title        = {AI@EDGE: {A} Secure and Reusable Artificial Intelligence Platform
                  for Edge Computing},
  booktitle    = {Joint European Conference on Networks and Communications {\&}
                  6G Summit, EuCNC/6G Summit 2021, Porto, Portugal, June 8-11, 2021},
  pages        = {610--615},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/EuCNC/6GSummit51104.2021.9482440},
  doi          = {10.1109/EUCNC/6GSUMMIT51104.2021.9482440},
  timestamp    = {Thu, 16 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eucnc/RiggioCLJMGRSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmec/AhmedBJJ21,
  author       = {Monjur Ahmed and
                  Md. Mahabub Alam Bhuiyan and
                  Sapna Jaidka and
                  Peerumporn Jiranantanagorn},
  title        = {A Decentralised Mechanism for Secure Cloud Computing Transactions},
  booktitle    = {Sixth International Conference on Fog and Mobile Edge Computing, {FMEC}
                  2021, Gandia, Spain, December 6-9, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/FMEC54266.2021.9732405},
  doi          = {10.1109/FMEC54266.2021.9732405},
  timestamp    = {Mon, 21 Mar 2022 18:09:54 +0100},
  biburl       = {https://dblp.org/rec/conf/fmec/AhmedBJJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuAKNR21,
  author       = {Shaoliang Zhu and
                  Alia Asheralieva and
                  Md. Monjurul Karim and
                  Dusit Niyato and
                  Khuhawar Arif Raza},
  title        = {Secure Federated Learning Based on Coded Distributed Computing},
  booktitle    = {{IEEE} Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/GCWkshps52748.2021.9682063},
  doi          = {10.1109/GCWKSHPS52748.2021.9682063},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuAKNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccbdc/Shiraishi21,
  author       = {Momoko Shiraishi},
  title        = {Secure Big Data Management based on Secret Sharing and Verifiable
                  Computing},
  booktitle    = {{ICCBDC} 2021: 5th International Conference on Cloud and Big Data
                  Computing, Liverpool, United Kingdom, August 13 - 15, 2021},
  pages        = {21--25},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3481646.3481650},
  doi          = {10.1145/3481646.3481650},
  timestamp    = {Thu, 02 Dec 2021 10:56:03 +0100},
  biburl       = {https://dblp.org/rec/conf/iccbdc/Shiraishi21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LiZXT21,
  author       = {Yun Li and
                  Xuefei Zhang and
                  Xiaodong Xu and
                  Xiaofeng Tao},
  title        = {Secure network slicing deployment in edge computing},
  booktitle    = {10th {IEEE/CIC} International Conference on Communications in China,
                  {ICCC} 2021, Xiamen, China, July 28-30, 2021},
  pages        = {97--102},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCC52777.2021.9580199},
  doi          = {10.1109/ICCC52777.2021.9580199},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/LiZXT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccnt/NairJG21,
  author       = {Nidhi Nair and
                  Tanuj Jain and
                  Mihir Gada},
  title        = {Secured File Storage in Cloud Computing Application: Secura-Drive},
  booktitle    = {12th International Conference on Computing Communication and Networking
                  Technologies, {ICCCNT} 2021, Kharagpur, India, July 6-8, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCCNT51525.2021.9580145},
  doi          = {10.1109/ICCCNT51525.2021.9580145},
  timestamp    = {Thu, 25 Nov 2021 09:08:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icccnt/NairJG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YuY0Z21,
  author       = {Zhaofeng Yu and
                  Lin Ye and
                  Hongli Zhang and
                  Dongyang Zhan},
  editor       = {Xingming Sun and
                  Xiaorui Zhang and
                  Zhihua Xia and
                  Elisa Bertino},
  title        = {A Container-Oriented Virtual-Machine-Introspection-Based Security
                  Monitor to Secure Containers in Cloud Computing},
  booktitle    = {Artificial Intelligence and Security - 7th International Conference,
                  {ICAIS} 2021, Dublin, Ireland, July 19-23, 2021, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12737},
  pages        = {102--111},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78612-0\_8},
  doi          = {10.1007/978-3-030-78612-0\_8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/YuY0Z21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse2/Zong21,
  author       = {Zhong Zong},
  title        = {Research on The secure Transmission Method of Cloud Computing Data},
  booktitle    = {16th International Conference on Computer Science {\&} Education,
                  {ICCSE} 2021, Lancaster, United Kingdom, August 17-21, 2021},
  pages        = {329--332},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICCSE51940.2021.9569731},
  doi          = {10.1109/ICCSE51940.2021.9569731},
  timestamp    = {Wed, 03 Nov 2021 16:14:37 +0100},
  biburl       = {https://dblp.org/rec/conf/iccse2/Zong21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icict/ShuklaTB21,
  author       = {Saurabh Shukla and
                  Subhasis Thakur and
                  John G. Breslin},
  editor       = {Xin{-}She Yang and
                  Simon Sherratt and
                  Nilanjan Dey and
                  Amit Joshi},
  title        = {Secure Data Transmission in Smart Meters Using Q-Learning in Fog Computing
                  Environment},
  booktitle    = {Proceedings of Sixth International Congress on Information and Communication
                  Technology - {ICICT} 2021, London, Volume 3},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {216},
  pages        = {667--678},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-1781-2\_58},
  doi          = {10.1007/978-981-16-1781-2\_58},
  timestamp    = {Wed, 04 May 2022 17:52:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icict/ShuklaTB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/0002LWLL21,
  author       = {Yang Shi and
                  Mianhong Li and
                  Wujing Wei and
                  Yangyang Liu and
                  Xiapu Luo},
  editor       = {Zhi Jin and
                  Xuandong Li and
                  Jianwen Xiang and
                  Leonardo Mariani and
                  Ting Liu and
                  Xiao Yu and
                  Nahgmeh Ivaki},
  title        = {Secure and Efficient White-box Encryption Scheme for Data Protection
                  against Shared Cache Attacks in Cloud Computing},
  booktitle    = {32nd {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2021, Wuhan, China, October 25-28, 2021},
  pages        = {446--456},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISSRE52982.2021.00053},
  doi          = {10.1109/ISSRE52982.2021.00053},
  timestamp    = {Tue, 20 Aug 2024 07:54:45 +0200},
  biburl       = {https://dblp.org/rec/conf/issre/0002LWLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ist/PraveenSMK21,
  author       = {S. Phani Praveen and
                  S. Sindhura and
                  A. Madhuri and
                  Dimitrios A. Karras},
  title        = {A Novel Effective Framework for Medical Images Secure Storage Using
                  Advanced Cipher Text Algorithm in Cloud Computing},
  booktitle    = {{IEEE} International Conference on Imaging Systems and Techniques,
                  {IST} 2021, Kaohsiung, Taiwan, August 24-26, 2021},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IST50367.2021.9651475},
  doi          = {10.1109/IST50367.2021.9651475},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ist/PraveenSMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/Kamoun-AbidRMZ21,
  author       = {Ferdaous Kamoun{-}Abid and
                  Malek Rekik and
                  Amel Meddeb{-}Makhlouf and
                  Faouzi Zarai},
  editor       = {Jaroslaw Watr{\'{o}}bski and
                  Wojciech Salabun and
                  Carlos Toro and
                  Cecilia Zanni{-}Merk and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Secure architecture for Cloud/Fog computing based on firewalls and
                  controllers},
  booktitle    = {Knowledge-Based and Intelligent Information {\&} Engineering Systems:
                  Proceedings of the 25th International Conference KES-2021, Virtual
                  Event / Szczecin, Poland, 8-10 September 2021},
  series       = {Procedia Computer Science},
  volume       = {192},
  pages        = {822--833},
  publisher    = {Elsevier},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.procs.2021.08.085},
  doi          = {10.1016/J.PROCS.2021.08.085},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/Kamoun-AbidRMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mipro/NovkovicBGG21,
  author       = {Bojan Novkovic and
                  Anita Bozic and
                  Marin Golub and
                  Stjepan Gros},
  editor       = {Marko Koricic and
                  Karolj Skala and
                  Zeljka Car and
                  Marina Cicin{-}Sain and
                  Snjezana Babic and
                  Vlado Sruk and
                  Dejan Skvorc and
                  Slobodan Ribaric and
                  Bojan Jerbic and
                  Stjepan Gros and
                  Boris Vrdoljak and
                  Mladen Mauher and
                  Edvard Tijan and
                  Tihomir Katulic and
                  Juraj Petrovic and
                  Tihana Galinac Grbac and
                  Nikola Filip Fijan and
                  Vera Gradisnik},
  title        = {Confidential Computing as an Attempt to Secure Service Provider's
                  Confidential Client Data in a Multi-Tenant Cloud Environment},
  booktitle    = {44th International Convention on Information, Communication and Electronic
                  Technology, {MIPRO} 2021, Opatija, Croatia, September 27 - Oct. 1,
                  2021},
  pages        = {1213--1218},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/MIPRO52101.2021.9597198},
  doi          = {10.23919/MIPRO52101.2021.9597198},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mipro/NovkovicBGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisec2/ZhaoHZZ21,
  author       = {Yan Zhao and
                  Ning Hu and
                  Jincai Zou and
                  Yuqiang Zhang},
  editor       = {Ilsun You and
                  Hwankuk Kim and
                  Taek{-}Young Youn and
                  Francesco Palmieri and
                  Igor V. Kotenko},
  title        = {A Secure Dispersed Computing Scheme for Internet of Mobile Things},
  booktitle    = {Mobile Internet Security - 5th International Symposium, MobiSec 2021,
                  Jeju Island, South Korea, October 7-9, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1544},
  pages        = {65--78},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-9576-6\_6},
  doi          = {10.1007/978-981-16-9576-6\_6},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisec2/ZhaoHZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/HanTDSZL21,
  author       = {Xu Han and
                  Daxin Tian and
                  Xuting Duan and
                  Zhengguo Sheng and
                  Jianshan Zhou and
                  Victor C. M. Leung},
  editor       = {Mirela Notare and
                  Peng Sun},
  title        = {A Dual Mode Privacy-Preserving Scheme Enabled Secure and Anonymous
                  for Edge Computing Assisted Internet of Vehicle Networks},
  booktitle    = {DIVANet '21: Proceedings of the 11th {ACM} Symposium on Design and
                  Analysis of Intelligent Vehicular Networks and Applications, Alicante,
                  Spain, November 22 - 26, 2021},
  pages        = {65--70},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3479243.3487310},
  doi          = {10.1145/3479243.3487310},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/HanTDSZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/MatosRT21,
  author       = {Filipe Fernandes S. B. de Matos and
                  Paulo A. L. Rego and
                  Fernando A. M. Trinta},
  editor       = {Mirela Notare and
                  Peng Sun},
  title        = {Secure Computational Offloading with gRPC: {A} Performance Evaluation
                  in a Mobile Cloud Computing Environment},
  booktitle    = {DIVANet '21: Proceedings of the 11th {ACM} Symposium on Design and
                  Analysis of Intelligent Vehicular Networks and Applications, Alicante,
                  Spain, November 22 - 26, 2021},
  pages        = {45--52},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3479243.3487295},
  doi          = {10.1145/3479243.3487295},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mswim/MatosRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/ManikandanSCS21,
  author       = {Saravanan Manikandan and
                  Islam M. D. Saikhul and
                  Hsing{-}Chung Chen and
                  Yu{-}Lin Song},
  editor       = {Leonard Barolli and
                  Hsing{-}Chung Chen and
                  Tomoya Enokido},
  title        = {Secure Cloud Storage Using Color Code in {DNA} Computing},
  booktitle    = {Advances in Networked-Based Information Systems - The 24th International
                  Conference on Network-Based Information Systems (NBiS-2021), Taichung,
                  Taiwan, 1-3 September, 2021},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {313},
  pages        = {105--116},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84913-9\_10},
  doi          = {10.1007/978-3-030-84913-9\_10},
  timestamp    = {Thu, 12 Aug 2021 13:43:08 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/ManikandanSCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/PolinskyD0E21,
  author       = {Isaac Polinsky and
                  Pubali Datta and
                  Adam Bates and
                  William Enck},
  editor       = {Jorge Lobo and
                  Roberto Di Pietro and
                  Omar Chowdhury and
                  Hongxin Hu},
  title        = {{SCIFFS:} Enabling Secure Third-Party Security Analytics using Serverless
                  Computing},
  booktitle    = {{SACMAT} '21: The 26th {ACM} Symposium on Access Control Models and
                  Technologies, Virtual Event, Spain, June 16-18, 2021},
  pages        = {175--186},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3450569.3463567},
  doi          = {10.1145/3450569.3463567},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/PolinskyD0E21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sirocco/Rajsbaum21,
  author       = {Sergio Rajsbaum},
  editor       = {Tomasz Jurdzinski and
                  Stefan Schmid},
  title        = {A Distributed Computing Perspective of Unconditionally Secure Information
                  Transmission in Russian Cards Problems},
  booktitle    = {Structural Information and Communication Complexity - 28th International
                  Colloquium, {SIROCCO} 2021, Wroc{\l}aw, Poland, June 28 - July 1,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12810},
  pages        = {277--295},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-79527-6\_16},
  doi          = {10.1007/978-3-030-79527-6\_16},
  timestamp    = {Tue, 22 Jun 2021 16:58:40 +0200},
  biburl       = {https://dblp.org/rec/conf/sirocco/Rajsbaum21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcom/LiCXWLWWW21,
  author       = {He Li and
                  Rongqiang Cao and
                  Hanwen Xiu and
                  Meng Wan and
                  Kai Li and
                  Xiaoguang Wang and
                  Yangang Wang and
                  Jue Wang},
  editor       = {Meikang Qiu and
                  Keke Gai and
                  Han Qiu},
  title        = {Secure Shell Remote Access for Virtualized Computing Environment},
  booktitle    = {Smart Computing and Communication - 6th International Conference,
                  SmartCom 2021, New York City, NY, USA, December 29-31, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13202},
  pages        = {123--132},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97774-0\_11},
  doi          = {10.1007/978-3-030-97774-0\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcom/LiCXWLWWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Balasubramanian21,
  author       = {Venki Balasubramanian and
                  Rehena Sulthana and
                  Andrew Stranieri and
                  G. Manoharan and
                  Teena Arora and
                  Ram Srinivasan and
                  K. Mahalakshmi and
                  Varun G. Menon},
  title        = {A Secured Real-Time IoMT Application for Monitoring Isolated {COVID-19}
                  Patients using Edge Computing},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {1227--1234},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00167},
  doi          = {10.1109/TRUSTCOM53373.2021.00167},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Balasubramanian21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Cheng0WG21,
  author       = {Cong Cheng and
                  Lingzhi Li and
                  Jin Wang and
                  Fei Gu},
  title        = {The Design and Implementation of Secure Distributed Image Classification
                  Reasoning System for Heterogeneous Edge Computing},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {250--257},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00049},
  doi          = {10.1109/TRUSTCOM53373.2021.00049},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/Cheng0WG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/CuiWZL021,
  author       = {Mingyue Cui and
                  Jin Wang and
                  Jingya Zhou and
                  Kejie Lu and
                  Jianping Wang},
  title        = {The Design of Secure Coded Edge Computing for User-Edge Collaborative
                  Computing},
  booktitle    = {20th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2021, Shenyang, China, October
                  20-22, 2021},
  pages        = {224--231},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/TrustCom53373.2021.00046},
  doi          = {10.1109/TRUSTCOM53373.2021.00046},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/CuiWZL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/TeseiLP021,
  author       = {Andrea Tesei and
                  Marco Luise and
                  Paolo Pagano and
                  Joaquim Ferreira},
  title        = {Secure Multi-access Edge Computing Assisted Maneuver Control for Autonomous
                  Vehicles},
  booktitle    = {93rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2021, Helsinki,
                  Finland, April 25-28, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/VTC2021-Spring51267.2021.9449087},
  doi          = {10.1109/VTC2021-SPRING51267.2021.9449087},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/TeseiLP021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/GuZG21,
  author       = {Xiaohui Gu and
                  Guoan Zhang and
                  Jinyuan Gu},
  title        = {Offloading Optimization for Energy-Minimization Secure UAV-Edge-Computing
                  Systems},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2021,
                  Nanjing, China, March 29 - April 1, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WCNC49053.2021.9417527},
  doi          = {10.1109/WCNC49053.2021.9417527},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/GuZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/SunLT21,
  author       = {Yang Sun and
                  Na Li and
                  Xiaofeng Tao},
  title        = {Privacy Preserved Secure Offloading in the Multi-access Edge Computing
                  Network},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference Workshops,
                  {WCNC} Workshops 2021, Nanjing, China, March 29, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WCNCW49093.2021.9419987},
  doi          = {10.1109/WCNCW49093.2021.9419987},
  timestamp    = {Sun, 19 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/SunLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/Yao0WXY21,
  author       = {Jiming Yao and
                  Wei Wang and
                  Peng Wu and
                  Ningzhe Xing and
                  Chun Yang},
  title        = {A Secure Data Transmission Method for Power 5G Edge Computing Scenarios},
  booktitle    = {13th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2021, Changsha, China, October 20-22, 2021},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/WCSP52459.2021.9613302},
  doi          = {10.1109/WCSP52459.2021.9613302},
  timestamp    = {Wed, 08 Dec 2021 09:34:06 +0100},
  biburl       = {https://dblp.org/rec/conf/wcsp/Yao0WXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mc/21/0001L21,
  author       = {Can Liu and
                  Janne Lindqvist},
  editor       = {Parisa Eslambolchilar and
                  Andreas Komninos and
                  Mark D. Dunlop},
  title        = {Secure Gestures - Case Study 4},
  booktitle    = {Intelligent Computing for Interactive System Design: Statistics, Digital
                  Signal Processing, and Machine Learning in Practice},
  pages        = {323--338},
  publisher    = {{ACM} / Morgan {\&} Claypool},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447404.3447422},
  doi          = {10.1145/3447404.3447422},
  timestamp    = {Tue, 10 Aug 2021 12:21:03 +0200},
  biburl       = {https://dblp.org/rec/books/mc/21/0001L21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/mc/21/McMenemy21h,
  author       = {David McMenemy},
  editor       = {Parisa Eslambolchilar and
                  Andreas Komninos and
                  Mark D. Dunlop},
  title        = {Ethics and Secure Gestures},
  booktitle    = {Intelligent Computing for Interactive System Design: Statistics, Digital
                  Signal Processing, and Machine Learning in Practice},
  pages        = {339--340},
  publisher    = {{ACM} / Morgan {\&} Claypool},
  year         = {2021},
  url          = {https://doi.org/10.1145/3447404.3447423},
  doi          = {10.1145/3447404.3447423},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/mc/21/McMenemy21h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2021,
  title        = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2021, Canada, October 25-28, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DASC/PiCom/CBDCom/Cy52372.2021},
  doi          = {10.1109/DASC/PICOM/CBDCOM/CY52372.2021},
  isbn         = {978-1-6654-2174-4},
  timestamp    = {Wed, 23 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/desec/2021,
  title        = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021,
                  Aizuwakamatsu, Japan, January 30 - February 2, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC49826.2021},
  doi          = {10.1109/DSC49826.2021},
  isbn         = {978-1-7281-7534-8},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-01264,
  author       = {Nadya Bliss and
                  Lawrence A. Gordon and
                  Daniel Lopresti and
                  Fred Schneider and
                  Suresh Venkatasubramanian},
  title        = {A Research Ecosystem for Secure Computing},
  journal      = {CoRR},
  volume       = {abs/2101.01264},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.01264},
  eprinttype    = {arXiv},
  eprint       = {2101.01264},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-01264.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-00378,
  author       = {Deeksha Dangwal and
                  Meghan Cowan and
                  Armin Alaghi and
                  Vincent T. Lee and
                  Brandon Reagen and
                  Caroline Trippel},
  title        = {SoK: Opportunities for Software-Hardware-Security Codesign for Next
                  Generation Secure Computing},
  journal      = {CoRR},
  volume       = {abs/2105.00378},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.00378},
  eprinttype    = {arXiv},
  eprint       = {2105.00378},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-00378.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-12958,
  author       = {Tingting Tang and
                  Ramy E. Ali and
                  Hanieh Hashemi and
                  Tynan Gangwani and
                  Salman Avestimehr and
                  Murali Annavaram},
  title        = {Verifiable Coded Computing: Towards Fast, Secure and Private Distributed
                  Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2107.12958},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.12958},
  eprinttype    = {arXiv},
  eprint       = {2107.12958},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-12958.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-00469,
  author       = {Ling He and
                  Miaowen Wen and
                  Yingyang Chen and
                  Bingli Jiao},
  title        = {Delay Aware Secure Offloading for NOMA-Assisted Mobile Edge Computing
                  in Internet of Vehicles},
  journal      = {CoRR},
  volume       = {abs/2108.00469},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.00469},
  eprinttype    = {arXiv},
  eprint       = {2108.00469},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-00469.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-03994,
  author       = {Carolyn Ellis and
                  Matthew Route and
                  Christopher Phillips and
                  Nicholas Smith and
                  Alex Younts},
  title        = {Cloud to Ground Secured Computing: User Experiences on the Transition
                  from Cloud-Based to Locally-Sited Hardware},
  journal      = {CoRR},
  volume       = {abs/2108.03994},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.03994},
  eprinttype    = {arXiv},
  eprint       = {2108.03994},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-03994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-02952,
  author       = {Yao Ma and
                  Elham Kashefi and
                  Myrto Arapinis and
                  Kaushik Chakraborty and
                  Marc Kaplan},
  title        = {QEnclave - {A} practical solution for secure quantum cloud computing},
  journal      = {CoRR},
  volume       = {abs/2109.02952},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.02952},
  eprinttype    = {arXiv},
  eprint       = {2109.02952},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-02952.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-04457,
  author       = {Hanif Deylami and
                  Jairo A. Guti{\'{e}}rrez and
                  Roopak Sinha},
  title        = {Tailoring the Cyber Security Framework: How to Overcome the Complexities
                  of Secure Live Virtual Machine Migration in Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/2110.04457},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.04457},
  eprinttype    = {arXiv},
  eprint       = {2110.04457},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-04457.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-15161,
  author       = {Qing Yang and
                  Hao Wang and
                  Xiaoxiao Wu and
                  Taotao Wang and
                  Shengli Zhang and
                  Naijin Liu},
  title        = {Secure Blockchain Platform for Industrial IoT with Trusted Computing
                  Hardware},
  journal      = {CoRR},
  volume       = {abs/2110.15161},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.15161},
  eprinttype    = {arXiv},
  eprint       = {2110.15161},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-15161.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-03396,
  author       = {Andreas Grafberger and
                  Mohak Chadha and
                  Anshul Jindal and
                  Jianfeng Gu and
                  Michael Gerndt},
  title        = {FedLess: Secure and Scalable Federated Learning Using Serverless Computing},
  journal      = {CoRR},
  volume       = {abs/2111.03396},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.03396},
  eprinttype    = {arXiv},
  eprint       = {2111.03396},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-03396.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-07672,
  author       = {Poornima Mahadevappa and
                  Raja Kumar Murugesan},
  title        = {A Data Quarantine Model to Secure Data in Edge Computing},
  journal      = {CoRR},
  volume       = {abs/2111.07672},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.07672},
  eprinttype    = {arXiv},
  eprint       = {2111.07672},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-07672.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BagheryGOST21,
  author       = {Karim Baghery and
                  Cyprien Delpech de Saint Guilhem and
                  Emmanuela Orsini and
                  Nigel P. Smart and
                  Titouan Tanguy},
  title        = {Compilation of Function Representations for Secure Computing Paradigms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/195},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BagheryGOST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JinKNRSW21,
  author       = {Weizhao Jin and
                  Bhaskar Krishnamachari and
                  Muhammad Naveed and
                  Srivatsan Ravi and
                  Eduard Sanou and
                  Kwame{-}Lante Wright},
  title        = {Secure Publish-Process-Subscribe System for Dispersed Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1668},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1668},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JinKNRSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/AnoopS21,
  title        = {Multi-user energy efficient secured framework with dynamic resource
                  allocation policy for mobile edge network computing},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {12},
  number       = {7},
  pages        = {7317--7332},
  year         = {2021},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s12652-020-02407-y},
  doi          = {10.1007/S12652-020-02407-Y},
  timestamp    = {Wed, 13 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/AnoopS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Ning20,
  author       = {Rui Ning},
  title        = {Secure Mobile Computing by Using Convolutional and Capsule Deep Neural
                  Networks},
  school       = {Old Dominion University, Norfolk, Virginia, {USA}},
  year         = {2020},
  url          = {https://digitalcommons.odu.edu/ece\_etds/219},
  timestamp    = {Mon, 02 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Ning20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Oppermann20,
  author       = {Alexander Oppermann},
  title        = {Secure cloud computing in legal metrology},
  school       = {Technical University of Berlin, Germany},
  year         = {2020},
  url          = {https://nbn-resolving.org/urn:nbn:de:101:1-2020031100583986700843},
  urn          = {urn:nbn:de:101:1-2020031100583986700843},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Oppermann20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/AlJumyli20,
  author       = {Waleed Khalid Hassan Al{-}Jumyli},
  title        = {Towards secure identity-based cryptosystems for cloud computing},
  school       = {University of Buckingham, {UK}},
  year         = {2020},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.848571},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/AlJumyli20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Liu20e,
  author       = {Renju Liu},
  title        = {Secure and Safe Edge Computing for the Internet-of-Things},
  school       = {University of California, Los Angeles, {USA}},
  year         = {2020},
  url          = {https://www.escholarship.org/uc/item/9mm449dt},
  timestamp    = {Wed, 12 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Liu20e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JiangY20,
  author       = {Mingfang Jiang and
                  Hengfu Yang},
  title        = {Secure Outsourcing Algorithm of {BTC} Feature Extraction in Cloud
                  Computing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {106958--106967},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3000683},
  doi          = {10.1109/ACCESS.2020.3000683},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JiangY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JinXYHK20,
  author       = {Wenquan Jin and
                  Rongxu Xu and
                  Taewan You and
                  Yong{-}Geun Hong and
                  Dohyeun Kim},
  title        = {Secure Edge Computing Management Based on Independent Microservices
                  Providers for Gateway-Centric IoT Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {187975--187990},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3030297},
  doi          = {10.1109/ACCESS.2020.3030297},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/JinXYHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiCKRBSV20,
  author       = {Junxia Li and
                  Jinjin Cai and
                  Fazlullah Khan and
                  Ateeq Ur Rehman and
                  Venki Balasubramaniam and
                  Jiangfeng Sun and
                  P. Venu},
  title        = {A Secured Framework for SDN-Based Edge Computing in IoT-Enabled Healthcare
                  System},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {135479--135490},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3011503},
  doi          = {10.1109/ACCESS.2020.3011503},
  timestamp    = {Wed, 08 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiCKRBSV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiCWLEWZ20,
  author       = {Fengyin Li and
                  Can Cui and
                  Dongfeng Wang and
                  Zhongxing Liu and
                  Nebrase Elmrabit and
                  Ying Wang and
                  Huiyu Zhou},
  title        = {Privacy-Aware Secure Anonymous Communication Protocol in {CPSS} Cloud
                  Computing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {62660--62669},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2982961},
  doi          = {10.1109/ACCESS.2020.2982961},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiCWLEWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Liu20a,
  author       = {Pengtao Liu},
  title        = {Public-Key Encryption Secure Against Related Randomness Attacks for
                  Improved End-to-End Security of Cloud/Edge Computing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {16750--16759},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2967457},
  doi          = {10.1109/ACCESS.2020.2967457},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Liu20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiuSWSW20,
  author       = {Boyang Liu and
                  Jiajia Song and
                  Jin Wang and
                  Haijian Sun and
                  Qun Wang},
  title        = {Robust Secure Wireless Powered {MISO} Cognitive Mobile Edge Computing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {62356--62366},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2984520},
  doi          = {10.1109/ACCESS.2020.2984520},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiuSWSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangLF20,
  author       = {Jin Wang and
                  Boyang Liu and
                  Ling Feng},
  title        = {Secure {MISO} Cognitive-Based Mobile Edge Computing With Wireless
                  Power Transfer},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {15518--15528},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2967221},
  doi          = {10.1109/ACCESS.2020.2967221},
  timestamp    = {Fri, 07 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangLF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangXFX20,
  author       = {Hua Wang and
                  Zhihua Xia and
                  Jianwei Fei and
                  Fengjun Xiao},
  title        = {An AES-Based Secure Image Retrieval Scheme Using Random Mapping and
                  {BOW} in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {61138--61147},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2983194},
  doi          = {10.1109/ACCESS.2020.2983194},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangXFX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangL20e,
  author       = {Wenjuan Zhang and
                  Gang Li},
  title        = {An Efficient and Secure Data Transmission Mechanism for Internet of
                  Vehicles Considering Privacy Protection in Fog Computing Environment},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {64461--64474},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2983994},
  doi          = {10.1109/ACCESS.2020.2983994},
  timestamp    = {Mon, 19 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangL20e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhaoTTZ20,
  author       = {Wei Zhao and
                  Chengliang Tian and
                  Weizhong Tian and
                  Yan Zhang},
  title        = {Securely and Efficiently Computing the Hermite Normal Form of Integer
                  Matrices via Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {137616--137630},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3011965},
  doi          = {10.1109/ACCESS.2020.3011965},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhaoTTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/DeebakAM20,
  author       = {Bakkiam David Deebak and
                  Fadi Al{-}Turjman and
                  Leonardo Mostarda},
  title        = {Seamless secure anonymous authentication for cloud-based mobile edge
                  computing},
  journal      = {Comput. Electr. Eng.},
  volume       = {87},
  pages        = {106782},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.compeleceng.2020.106782},
  doi          = {10.1016/J.COMPELECENG.2020.106782},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/DeebakAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cejcs/JainN20,
  author       = {Rachna Jain and
                  Anand Nayyar},
  title        = {A novel homomorphic {RASD} framework for secured data access and storage
                  in cloud computing},
  journal      = {Open Comput. Sci.},
  volume       = {10},
  number       = {1},
  pages        = {431--443},
  year         = {2020},
  url          = {https://doi.org/10.1515/comp-2020-0206},
  doi          = {10.1515/COMP-2020-0206},
  timestamp    = {Wed, 17 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cejcs/JainN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/JiangTGJ20,
  author       = {Jiafu Jiang and
                  Linyu Tang and
                  Ke Gu and
                  Weijia Jia},
  title        = {Secure Computing Resource Allocation Framework For Open Fog Computing},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {4},
  pages        = {567--592},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz108},
  doi          = {10.1093/COMJNL/BXZ108},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/JiangTGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiYW20,
  author       = {Qizhong Li and
                  Yizheng Yue and
                  Zhongqi Wang},
  title        = {Deep Robust Cramer Shoup Delay Optimized Fully Homomorphic For {IIOT}
                  secured transmission in cloud computing},
  journal      = {Comput. Commun.},
  volume       = {161},
  pages        = {10--18},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.06.017},
  doi          = {10.1016/J.COMCOM.2020.06.017},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LiYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/PatwaryFBNGM20,
  author       = {Abdullah Al{-}Noman Patwary and
                  Anmin Fu and
                  Sudheer Kumar Battula and
                  Ranesh Kumar Naha and
                  Saurabh Garg and
                  Aniket Mahanti},
  title        = {FogAuthChain: {A} secure location-based authentication scheme in fog
                  computing environments using Blockchain},
  journal      = {Comput. Commun.},
  volume       = {162},
  pages        = {212--224},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.comcom.2020.08.021},
  doi          = {10.1016/J.COMCOM.2020.08.021},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/PatwaryFBNGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/ChenZSCYC20,
  author       = {Lanxiang Chen and
                  Nan Zhang and
                  Hung{-}Min Sun and
                  Chin{-}Chen Chang and
                  Shui Yu and
                  Kim{-}Kwang Raymond Choo},
  title        = {Secure search for encrypted personal health records from big data
                  NoSQL databases in cloud},
  journal      = {Computing},
  volume       = {102},
  number       = {6},
  pages        = {1521--1545},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00607-019-00762-z},
  doi          = {10.1007/S00607-019-00762-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/ChenZSCYC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/KulkarniBS20,
  author       = {Lalit Kulkarni and
                  Jagdish W. Bakal and
                  Urmila Shrawankar},
  title        = {Energy based incentive scheme for secure opportunistic routing in
                  vehicular delay tolerant networks},
  journal      = {Computing},
  volume       = {102},
  number       = {1},
  pages        = {201--219},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00607-019-00735-2},
  doi          = {10.1007/S00607-019-00735-2},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/KulkarniBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computing/SahayGM20,
  author       = {Rashmi Sahay and
                  G. Geethakumari and
                  Barsha Mitra},
  title        = {A novel blockchain based framework to secure IoT-LLNs against routing
                  attacks},
  journal      = {Computing},
  volume       = {102},
  number       = {11},
  pages        = {2445--2470},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00607-020-00823-8},
  doi          = {10.1007/S00607-020-00823-8},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computing/SahayGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/WangZHCC20,
  author       = {Shunjiang Wang and
                  Yan Zhao and
                  Jiang He and
                  Rong Chen and
                  Lina Cao},
  title        = {A novel data-driven intelligent computing method for the secure control
                  of a benchmark microgrid system},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {17},
  number       = {3},
  pages        = {835--848},
  year         = {2020},
  url          = {https://doi.org/10.2298/CSIS190912023W},
  doi          = {10.2298/CSIS190912023W},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsis/WangZHCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/BhatiaVS20,
  author       = {Tarunpreet Bhatia and
                  A. K. Verma and
                  Gaurav Sharma},
  title        = {Towards a secure incremental proxy re-encryption for e-healthcare
                  data sharing in mobile cloud computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {32},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/cpe.5520},
  doi          = {10.1002/CPE.5520},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/BhatiaVS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/BJ20,
  author       = {Benjula Anbu Malar Manickam Bernard and
                  Prabhu Jayagopal},
  title        = {A distributed collaborative trust service recommender system for secure
                  cloud computing},
  journal      = {Trans. Emerg. Telecommun. Technol.},
  volume       = {31},
  number       = {12},
  year         = {2020},
  url          = {https://doi.org/10.1002/ett.3991},
  doi          = {10.1002/ETT.3991},
  timestamp    = {Mon, 14 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ett/BJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/VerderameMMCCDM20,
  author       = {Luca Verderame and
                  Ivan Merelli and
                  Lucia Morganti and
                  Elena Corni and
                  Daniele Cesini and
                  Daniele D'Agostino and
                  Alessio Merlo},
  title        = {A secure cloud-edges computing architecture for metagenomics analysis},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {111},
  pages        = {919--930},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.09.013},
  doi          = {10.1016/J.FUTURE.2019.09.013},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/VerderameMMCCDM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hcis/ChenHDCW20,
  author       = {Chin{-}Ling Chen and
                  Po{-}Tsun Huang and
                  Yong{-}Yuan Deng and
                  Hsing{-}Chung Chen and
                  Yun{-}Ciao Wang},
  title        = {A secure electronic medical record authorization system for smart
                  device application in cloud computing environments},
  journal      = {Hum. centric Comput. Inf. Sci.},
  volume       = {10},
  pages        = {21},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13673-020-00221-1},
  doi          = {10.1186/S13673-020-00221-1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/hcis/ChenHDCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/AlexPJ20,
  author       = {Sona Alex and
                  Deepthi P. Pattathil and
                  Dhanaraj Kakkanattu Jagalchandran},
  title        = {{SPCOR:} a secure and privacy-preserving protocol for mobile-healthcare
                  emergency to reap computing opportunities at remote and nearby},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {6},
  pages        = {670--682},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2020.0086},
  doi          = {10.1049/IET-IFS.2020.0086},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/AlexPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Veugen20,
  author       = {Thijs Veugen},
  title        = {Efficient coding for secure computing with additively-homomorphic
                  encrypted data},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {1--15},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJACT.2020.107160},
  doi          = {10.1504/IJACT.2020.107160},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Veugen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/TianW20,
  author       = {Jun{-}Feng Tian and
                  Haoning Wang},
  title        = {An efficient and secure data auditing scheme based on fog-to-cloud
                  computing for Internet of things scenarios},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {16},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1177/1550147720916623},
  doi          = {10.1177/1550147720916623},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/TianW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijec/FatimaA20,
  author       = {Shahin Fatima and
                  Shish Ahmad},
  title        = {Secure and Effective Key Management Using Secret Sharing Schemes in
                  Cloud Computing},
  journal      = {Int. J. e Collab.},
  volume       = {16},
  number       = {1},
  pages        = {1--15},
  year         = {2020},
  url          = {https://doi.org/10.4018/IJeC.2020010101},
  doi          = {10.4018/IJEC.2020010101},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijec/FatimaA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiuLCC20,
  author       = {Lihua Liu and
                  Yang Li and
                  Zhengjun Cao and
                  Zhen Chen},
  title        = {A Note On One Secure Data Self-Destructing Scheme In Cloud Computing},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {36--40},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n1/ijns-2020-v22-n1-p36-40.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiuLCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MinaamIB20,
  author       = {Diaa Salama Abdul Minaam and
                  Mostafa Abdullah Ibrahim and
                  Elsayed M. Badr},
  title        = {Chaotic {NHCP:} Building an Efficient Secure Framework for Cloud Computing
                  Environment Based on Chaos Theory},
  journal      = {Int. J. Netw. Secur.},
  volume       = {22},
  number       = {2},
  pages        = {283--295},
  year         = {2020},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v22-n2/ijns-2020-v22-n2-p283-295.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MinaamIB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/MohantaJS20,
  author       = {Bhabendu Kumar Mohanta and
                  Debasish Jena and
                  Srichandan Sobhanayak},
  title        = {Multi-party computation review for secure data processing in IoT-fog
                  computing environment},
  journal      = {Int. J. Secur. Networks},
  volume       = {15},
  number       = {3},
  pages        = {164--174},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSN.2020.109697},
  doi          = {10.1504/IJSN.2020.109697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/MohantaJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/Das20,
  author       = {Debasis Das},
  title        = {A hybrid algorithm for secure cloud computing},
  journal      = {Int. J. Wirel. Mob. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {116--122},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJWMC.2020.105693},
  doi          = {10.1504/IJWMC.2020.105693},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwmc/Das20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/AsheralievaN20a,
  author       = {Alia Asheralieva and
                  Dusit Niyato},
  title        = {Reputation-Based Coalition Formation for Secure Self-Organized and
                  Scalable Sharding in IoT Blockchains With Mobile-Edge Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {12},
  pages        = {11830--11850},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.3002969},
  doi          = {10.1109/JIOT.2020.3002969},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/AsheralievaN20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KumarSRTGKR20,
  author       = {Gulshan Kumar and
                  Rahul Saha and
                  Mritunjay Kumar Rai and
                  Reji Thomas and
                  G. Geetha and
                  Tai{-}Hoon Kim and
                  Joel J. P. C. Rodrigues},
  title        = {A Novel Framework for Fog Computing: Lattice-Based Secured Framework
                  for Cloud Interface},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {8},
  pages        = {7783--7794},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2991105},
  doi          = {10.1109/JIOT.2020.2991105},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KumarSRTGKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiLXXHL20,
  author       = {Yiran Li and
                  Hongwei Li and
                  Guowen Xu and
                  Tao Xiang and
                  Xiaoming Huang and
                  Rongxing Lu},
  title        = {Toward Secure and Privacy-Preserving Distributed Deep Learning in
                  Fog-Cloud Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {12},
  pages        = {11460--11472},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.3012480},
  doi          = {10.1109/JIOT.2020.3012480},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiLXXHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/PengCOVH20,
  author       = {Cong Peng and
                  Jianhua Chen and
                  Mohammad S. Obaidat and
                  Pandi Vijayakumar and
                  Debiao He},
  title        = {Efficient and Provably Secure Multireceiver Signcryption Scheme for
                  Multicast Communication in Edge Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {7},
  pages        = {6056--6068},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2949708},
  doi          = {10.1109/JIOT.2019.2949708},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/PengCOVH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RajeshPMJV20,
  author       = {Sreeja Rajesh and
                  Varghese Paul and
                  Varun G. Menon and
                  Sunil Jacob and
                  P. Vinod},
  title        = {Secure Brain-to-Brain Communication With Edge Computing for Assisting
                  Post-Stroke Paralyzed Patients},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {2531--2538},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2951405},
  doi          = {10.1109/JIOT.2019.2951405},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/RajeshPMJV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WuA20,
  author       = {Di Wu and
                  Nirwan Ansari},
  title        = {A Cooperative Computing Strategy for Blockchain-Secured Fog Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {7},
  pages        = {6603--6609},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2974231},
  doi          = {10.1109/JIOT.2020.2974231},
  timestamp    = {Tue, 11 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WuA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotm/HammoudSMOMB20,
  author       = {Ahmad Hammoud and
                  Hani Sami and
                  Azzam Mourad and
                  Hadi Otrok and
                  Rabeb Mizouni and
                  Jamal Bentahar},
  title        = {AI, Blockchain, and Vehicular Edge Computing for Smart and Secure
                  IoV: Challenges and Directions},
  journal      = {{IEEE} Internet Things Mag.},
  volume       = {3},
  number       = {2},
  pages        = {68--73},
  year         = {2020},
  url          = {https://doi.org/10.1109/IOTM.0001.1900109},
  doi          = {10.1109/IOTM.0001.1900109},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotm/HammoudSMOMB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MishraDYRVK20,
  author       = {Dheerendra Mishra and
                  Dharminder Dharminder and
                  Preeti Yadav and
                  Y. Sreenivasa Rao and
                  Pandi Vijayakumar and
                  Neeraj Kumar},
  title        = {A provably secure dynamic ID-based authenticated key agreement framework
                  for mobile edge computing without a trusted party},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {55},
  pages        = {102648},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102648},
  doi          = {10.1016/J.JISA.2020.102648},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MishraDYRVK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/LuPX20,
  author       = {Xiuqing Lu and
                  Zhenkuan Pan and
                  Hequn Xian},
  title        = {An efficient and secure data sharing scheme for mobile devices in
                  cloud computing},
  journal      = {J. Cloud Comput.},
  volume       = {9},
  pages        = {60},
  year         = {2020},
  url          = {https://doi.org/10.1186/s13677-020-00207-5},
  doi          = {10.1186/S13677-020-00207-5},
  timestamp    = {Mon, 01 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcloudc/LuPX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/NareshVDR20,
  author       = {Ramu Naresh and
                  Pandi Vijayakumar and
                  Lazarus Jegatha Deborah and
                  Sivakumar Radhakrishnan},
  title        = {A Novel Trust Model for Secure Group Communication in Distributed
                  Computing},
  journal      = {J. Organ. End User Comput.},
  volume       = {32},
  number       = {3},
  pages        = {1--14},
  year         = {2020},
  url          = {https://doi.org/10.4018/JOEUC.2020070101},
  doi          = {10.4018/JOEUC.2020070101},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joeuc/NareshVDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/FanLZLY20,
  author       = {Kai Fan and
                  Tingting Liu and
                  Kuan Zhang and
                  Hui Li and
                  Yintang Yang},
  title        = {A secure and efficient outsourced computation on data sharing scheme
                  for privacy computing},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {135},
  pages        = {169--176},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2019.09.008},
  doi          = {10.1016/J.JPDC.2019.09.008},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/FanLZLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/Jararweh20,
  author       = {Yaser Jararweh},
  title        = {Enabling efficient and secure energy cloud using edge computing and
                  5G},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {145},
  pages        = {42--49},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2020.06.014},
  doi          = {10.1016/J.JPDC.2020.06.014},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/Jararweh20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/YinQZDLL20,
  author       = {Hui Yin and
                  Zheng Qin and
                  Jixin Zhang and
                  Hua Deng and
                  Fangmin Li and
                  Keqin Li},
  title        = {A fine-grained authorized keyword secure search scheme with efficient
                  search permission update in cloud computing},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {135},
  pages        = {56--69},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jpdc.2019.09.011},
  doi          = {10.1016/J.JPDC.2019.09.011},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/YinQZDLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jrtip/LiuSWW20,
  author       = {Dengzhi Liu and
                  Jian Shen and
                  Anxi Wang and
                  Chen Wang},
  title        = {Secure real-time image protection scheme with near-duplicate detection
                  in cloud computing},
  journal      = {J. Real Time Image Process.},
  volume       = {17},
  number       = {1},
  pages        = {175--184},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11554-019-00887-6},
  doi          = {10.1007/S11554-019-00887-6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jrtip/LiuSWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/AbseherBCDW20,
  author       = {Michael Abseher and
                  Bernhard Bliem and
                  G{\"{u}}nther Charwat and
                  Frederico Dusberger and
                  Stefan Woltran},
  title        = {Computing secure sets in graphs using answer set programming},
  journal      = {J. Log. Comput.},
  volume       = {30},
  number       = {4},
  pages        = {837--862},
  year         = {2020},
  url          = {https://doi.org/10.1093/logcom/exv060},
  doi          = {10.1093/LOGCOM/EXV060},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/AbseherBCDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/KhanUNNQKKA20,
  author       = {Muhammad Asghar Khan and
                  Insaf Ullah and
                  Shibli Nisar and
                  Fazal Noor and
                  Ijaz Mansoor Qureshi and
                  Fahim Ullah Khanzada and
                  Hizbullah Khattak and
                  Muhammad Adnan Aziz},
  title        = {Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure
                  Deployment Using Identity-Based Generalized Signcryption},
  journal      = {Mob. Inf. Syst.},
  volume       = {2020},
  pages        = {8861947:1--8861947:15},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8861947},
  doi          = {10.1155/2020/8861947},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mis/KhanUNNQKKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SC20,
  author       = {Uma Maheswari S and
                  Vasanthanayaki C},
  title        = {Secure medical health care content protection system {(SMCPS)} with
                  watermark detection for multi cloud computing environment},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {5-6},
  pages        = {4075--4097},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-019-7724-z},
  doi          = {10.1007/S11042-019-7724-Z},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/YangLGZDL20,
  author       = {Yang Yang and
                  Ximeng Liu and
                  Wenzhong Guo and
                  Xianghan Zheng and
                  Chen Dong and
                  Zhiquan Liu},
  title        = {Multimedia access control with secure provenance in fog-cloud computing
                  networks},
  journal      = {Multim. Tools Appl.},
  volume       = {79},
  number       = {15-16},
  pages        = {10701--10716},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11042-020-08703-1},
  doi          = {10.1007/S11042-020-08703-1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/YangLGZDL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/QiuQL20,
  author       = {Han Qiu and
                  Meikang Qiu and
                  Ruqian Lu},
  title        = {Secure {V2X} Communication Network based on Intelligent {PKI} and
                  Edge Computing},
  journal      = {{IEEE} Netw.},
  volume       = {34},
  number       = {2},
  pages        = {172--178},
  year         = {2020},
  url          = {https://doi.org/10.1109/MNET.001.1900243},
  doi          = {10.1109/MNET.001.1900243},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/QiuQL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pcs/ShokurovAVZ20,
  author       = {Alexander V. Shokurov and
                  I. V. Abramova and
                  Nikolay P. Varnovsky and
                  Vladimir A. Zakharov},
  title        = {On the Possibility of Secure Program Obfuscation in Some Model of
                  Cloud Computing},
  journal      = {Program. Comput. Softw.},
  volume       = {46},
  number       = {7},
  pages        = {473--482},
  year         = {2020},
  url          = {https://doi.org/10.1134/S0361768820070051},
  doi          = {10.1134/S0361768820070051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pcs/ShokurovAVZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AwanSHSAD20,
  author       = {Ijaz Ahmad Awan and
                  Muhammad Shiraz and
                  Muhammad Usman Hashmi and
                  Qaisar Shaheen and
                  Rizwan Akhtar and
                  Allah Ditta},
  title        = {Secure Framework Enhancing {AES} Algorithm in Cloud Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8863345:1--8863345:16},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8863345},
  doi          = {10.1155/2020/8863345},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AwanSHSAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZouZSWPPW20,
  author       = {Ying Zou and
                  Zhen Zhao and
                  Sha Shi and
                  Lei Wang and
                  Yunfeng Peng and
                  Yuan Ping and
                  Baocang Wang},
  title        = {Highly Secure Privacy-Preserving Outsourced k-Means Clustering under
                  Multiple Keys in Cloud Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {1238505:1--1238505:11},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/1238505},
  doi          = {10.1155/2020/1238505},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZouZSWPPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/AlmajedA20,
  author       = {Hisham N. Almajed and
                  Ahmad S. Al{-}Mogren},
  title        = {A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet
                  of Things},
  journal      = {Sensors},
  volume       = {20},
  number       = {21},
  pages        = {6158},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20216158},
  doi          = {10.3390/S20216158},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/AlmajedA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiLFWLG20,
  author       = {Haifeng Li and
                  Caihui Lan and
                  Xingbing Fu and
                  Caifen Wang and
                  Fagen Li and
                  He Guo},
  title        = {A Secure and Lightweight Fine-Grained Data Sharing Scheme for Mobile
                  Cloud Computing},
  journal      = {Sensors},
  volume       = {20},
  number       = {17},
  pages        = {4720},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20174720},
  doi          = {10.3390/S20174720},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/LiLFWLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/NawazQGAGBKW20,
  author       = {Anum Nawaz and
                  Jorge Pe{\~{n}}a Queralta and
                  Jixin Guan and
                  Muhammad Awais and
                  Tuan Nguyen Gia and
                  Ali Kashif Bashir and
                  Haibin Kan and
                  Tomi Westerlund},
  title        = {Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum
                  Blockchain},
  journal      = {Sensors},
  volume       = {20},
  number       = {14},
  pages        = {3965},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20143965},
  doi          = {10.3390/S20143965},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/NawazQGAGBKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/NkenyereyeTSC20,
  author       = {Lewis Nkenyereye and
                  Bayu Adhi Tama and
                  Muhammad Khuram Shahzad and
                  Yoon{-}Ho Choi},
  title        = {Secure and Blockchain-Based Emergency Driven Message Protocol for
                  5G Enabled Vehicular Edge Computing},
  journal      = {Sensors},
  volume       = {20},
  number       = {1},
  pages        = {154},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20010154},
  doi          = {10.3390/S20010154},
  timestamp    = {Fri, 15 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/NkenyereyeTSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WuCZCC20,
  author       = {Hsiao{-}Ling Wu and
                  Chin{-}Chen Chang and
                  Yao{-}Zhu Zheng and
                  Long{-}Sheng Chen and
                  Chih{-}Cheng Chen},
  title        = {A Secure IoT-Based Authentication System in Cloud Computing Environment},
  journal      = {Sensors},
  volume       = {20},
  number       = {19},
  pages        = {5604},
  year         = {2020},
  url          = {https://doi.org/10.3390/s20195604},
  doi          = {10.3390/S20195604},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WuCZCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/JiaHKC20,
  author       = {Xiaoying Jia and
                  Debiao He and
                  Neeraj Kumar and
                  Kim{-}Kwang Raymond Choo},
  title        = {A Provably Secure and Efficient Identity-Based Anonymous Authentication
                  Scheme for Mobile Edge Computing},
  journal      = {{IEEE} Syst. J.},
  volume       = {14},
  number       = {1},
  pages        = {560--571},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSYST.2019.2896064},
  doi          = {10.1109/JSYST.2019.2896064},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/JiaHKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/YanWGLH20,
  author       = {Jiajun Yan and
                  Xiaoming Wang and
                  Qingqing Gan and
                  Suyu Li and
                  Daxin Huang},
  title        = {Secure and efficient big data deduplication in fog computing},
  journal      = {Soft Comput.},
  volume       = {24},
  number       = {8},
  pages        = {5671--5682},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00500-019-04215-9},
  doi          = {10.1007/S00500-019-04215-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/YanWGLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/suscom/ZhengLLS20,
  author       = {Wenying Zheng and
                  Dengzhi Liu and
                  Xiong Li and
                  Arun Kumar Sangaiah},
  title        = {Secure sustainable storage auditing protocol {(SSSAP)} with efficient
                  key updates for cloud computing},
  journal      = {Sustain. Comput. Informatics Syst.},
  volume       = {28},
  pages        = {100237},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.suscom.2018.03.002},
  doi          = {10.1016/J.SUSCOM.2018.03.002},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/suscom/ZhengLLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/YuHC20,
  author       = {Yicheng Yu and
                  Liang Hu and
                  Jianfeng Chu},
  title        = {A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud
                  Computing Environment},
  journal      = {Symmetry},
  volume       = {12},
  number       = {1},
  pages        = {150},
  year         = {2020},
  url          = {https://doi.org/10.3390/sym12010150},
  doi          = {10.3390/SYM12010150},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/YuHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/ZaghloulZR20,
  author       = {Ehab Zaghloul and
                  Kai Zhou and
                  Jian Ren},
  title        = {{P-MOD:} Secure Privilege-Based Multilevel Organizational Data-Sharing
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {6},
  number       = {4},
  pages        = {804--815},
  year         = {2020},
  url          = {https://doi.org/10.1109/TBDATA.2019.2907133},
  doi          = {10.1109/TBDATA.2019.2907133},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tbd/ZaghloulZR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Cai0T0Y20,
  author       = {Yi Cai and
                  Xiaoming Chen and
                  Lu Tian and
                  Yu Wang and
                  Huazhong Yang},
  title        = {Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse
                  Fast Gradient Encryption},
  journal      = {{IEEE} Trans. Computers},
  volume       = {69},
  number       = {11},
  pages        = {1596--1610},
  year         = {2020},
  url          = {https://doi.org/10.1109/TC.2020.3017870},
  doi          = {10.1109/TC.2020.3017870},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Cai0T0Y20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/Lee20,
  author       = {Kwangsu Lee},
  title        = {Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage
                  Identity-Based Encryption"},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {4},
  pages        = {1299--1300},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2020.2973623},
  doi          = {10.1109/TCC.2020.2973623},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/Lee20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/RenZFQL20,
  author       = {Yanli Ren and
                  Xinpeng Zhang and
                  Guorui Feng and
                  Zhenxing Qian and
                  Fengyong Li},
  title        = {How to Extract Image Features Based on Co-Occurrence Matrix Securely
                  and Efficiently in Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {1},
  pages        = {207--219},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2017.2737980},
  doi          = {10.1109/TCC.2017.2737980},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/RenZFQL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/BitarPR20,
  author       = {Rawad Bitar and
                  Parimal Parag and
                  Salim El Rouayheb},
  title        = {Minimizing Latency for Secure Coded Computing Using Secret Sharing
                  via Staircase Codes},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {68},
  number       = {8},
  pages        = {4609--4619},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCOMM.2020.2988506},
  doi          = {10.1109/TCOMM.2020.2988506},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/BitarPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/WuZHW20,
  author       = {Wei Wu and
                  Fuhui Zhou and
                  Rose Qingyang Hu and
                  Baoyun Wang},
  title        = {Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile
                  Edge Computing Networks},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {68},
  number       = {1},
  pages        = {493--505},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCOMM.2019.2949994},
  doi          = {10.1109/TCOMM.2019.2949994},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/WuZHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/ZhouPYWEVL20,
  author       = {Yi Zhou and
                  Cunhua Pan and
                  Phee Lep Yeoh and
                  Kezhi Wang and
                  Maged Elkashlan and
                  Branka Vucetic and
                  Yonghui Li},
  title        = {Secure Communications for UAV-Enabled Mobile Edge Computing Systems},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {68},
  number       = {1},
  pages        = {376--388},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCOMM.2019.2947921},
  doi          = {10.1109/TCOMM.2019.2947921},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/ZhouPYWEVL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/FuYLYWY20,
  author       = {Cai Fu and
                  Zhao Yang and
                  Xiao{-}Yang Liu and
                  Jia Yang and
                  Anwar Walid and
                  Laurence T. Yang},
  title        = {Secure Tensor Decomposition for Heterogeneous Multimedia Data in Cloud
                  Computing},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {247--260},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSS.2019.2959948},
  doi          = {10.1109/TCSS.2019.2959948},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/FuYLYWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NiZYLS20,
  author       = {Jianbing Ni and
                  Kuan Zhang and
                  Yong Yu and
                  Xiaodong Lin and
                  Xuemin Sherman Shen},
  title        = {Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing
                  via Fog Computing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {3},
  pages        = {581--594},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2791432},
  doi          = {10.1109/TDSC.2018.2791432},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/NiZYLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/ShenLBSSC20,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Md. Zakirul Alam Bhuiyan and
                  Jun Shen and
                  Xingming Sun and
                  Aniello Castiglione},
  title        = {Secure Verifiable Database Supporting Efficient Dynamic Operations
                  in Cloud Computing},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {8},
  number       = {2},
  pages        = {280--290},
  year         = {2020},
  url          = {https://doi.org/10.1109/TETC.2017.2776402},
  doi          = {10.1109/TETC.2017.2776402},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/ShenLBSSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/JangiralaDV20,
  author       = {Srinivas Jangirala and
                  Ashok Kumar Das and
                  Athanasios V. Vasilakos},
  title        = {Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication
                  Protocol for Supply Chains in 5G Mobile Edge Computing Environment},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {16},
  number       = {11},
  pages        = {7081--7093},
  year         = {2020},
  url          = {https://doi.org/10.1109/TII.2019.2942389},
  doi          = {10.1109/TII.2019.2942389},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/JangiralaDV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ElgendyZZHTY20,
  author       = {Ibrahim A. Elgendy and
                  Weizhe Zhang and
                  Yiming Zeng and
                  Hui He and
                  Yu{-}Chu Tian and
                  Yuanyuan Yang},
  title        = {Efficient and Secure Multi-User Multi-Task Computation Offloading
                  for Mobile-Edge Computing in Mobile IoT Networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {17},
  number       = {4},
  pages        = {2410--2422},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSM.2020.3020249},
  doi          = {10.1109/TNSM.2020.3020249},
  timestamp    = {Wed, 26 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/ElgendyZZHTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/GuWYJ20,
  author       = {Ke Gu and
                  Na Wu and
                  Bo Yin and
                  Weijia Jia},
  title        = {Secure Data Query Framework for Cloud and Fog Computing},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {17},
  number       = {1},
  pages        = {332--345},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNSM.2019.2941869},
  doi          = {10.1109/TNSM.2019.2941869},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/GuWYJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/ZhouWDO20,
  author       = {Zhenyu Zhou and
                  Bingchen Wang and
                  Mianxiong Dong and
                  Kaoru Ota},
  title        = {Secure and Efficient Vehicle-to-Grid Energy Trading in Cyber Physical
                  Systems: Integration of Blockchain and Edge Computing},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Syst.},
  volume       = {50},
  number       = {1},
  pages        = {43--57},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSMC.2019.2896323},
  doi          = {10.1109/TSMC.2019.2896323},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsmc/ZhouWDO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/ElhosenyAHMS20,
  author       = {Mohamed Elhoseny and
                  Hosny A. Abbas and
                  Aboul Ella Hassanien and
                  Khan Muhammad and
                  Arun Kumar Sangaiah},
  title        = {Secure Automated Forensic Investigation for Sustainable Critical Infrastructures
                  Compliant with Green Computing Requirements},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {174--191},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSUSC.2017.2782737},
  doi          = {10.1109/TSUSC.2017.2782737},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/ElhosenyAHMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WangYCWLW20,
  author       = {Jun{-}Bo Wang and
                  Hui Yang and
                  Ming Cheng and
                  Jin{-}Yuan Wang and
                  Min Lin and
                  Jiangzhou Wang},
  title        = {Joint Optimization of Offloading and Resources Allocation in Secure
                  Mobile Edge Computing Systems},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {8},
  pages        = {8843--8854},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.2996254},
  doi          = {10.1109/TVT.2020.2996254},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WangYCWLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/HeJD20,
  author       = {Xiaofan He and
                  Richeng Jin and
                  Huaiyu Dai},
  title        = {Physical-Layer Assisted Secure Offloading in Mobile-Edge Computing},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {19},
  number       = {6},
  pages        = {4054--4066},
  year         = {2020},
  url          = {https://doi.org/10.1109/TWC.2020.2979456},
  doi          = {10.1109/TWC.2020.2979456},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/HeJD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/KumarAMKK20,
  author       = {Vinod Kumar and
                  Musheer Ahmad and
                  Dheerendra Mishra and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {{RSEAP:} {RFID} based secure and efficient authentication protocol
                  for vehicular cloud computing},
  journal      = {Veh. Commun.},
  volume       = {22},
  pages        = {100213},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.vehcom.2019.100213},
  doi          = {10.1016/J.VEHCOM.2019.100213},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/KumarAMKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/ZhouYPWEWVL20,
  author       = {Yi Zhou and
                  Phee Lep Yeoh and
                  Cunhua Pan and
                  Kezhi Wang and
                  Maged Elkashlan and
                  Zhongfeng Wang and
                  Branka Vucetic and
                  Yonghui Li},
  title        = {Offloading Optimization for Low-Latency Secure Mobile Edge Computing
                  Systems},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {9},
  number       = {4},
  pages        = {480--484},
  year         = {2020},
  url          = {https://doi.org/10.1109/LWC.2019.2959579},
  doi          = {10.1109/LWC.2019.2959579},
  timestamp    = {Mon, 24 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wcl/ZhouYPWEWVL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/WangLYYX20,
  author       = {Zhe Wang and
                  Taoshen Li and
                  Jin Ye and
                  Xi Yang and
                  Ke Xiong},
  title        = {AN-Aided Secure Beamforming in SWIPT-Aware Mobile Edge Computing Systems
                  with Cognitive Radio},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {8899314:1--8899314:10},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8899314},
  doi          = {10.1155/2020/8899314},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/WangLYYX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/FangZCLT20,
  author       = {Weidong Fang and
                  Wuxiong Zhang and
                  Wei Chen and
                  Yang Liu and
                  Chaogang Tang},
  title        = {{TMSRS:} trust management-based secure routing scheme in industrial
                  wireless sensor network with fog computing},
  journal      = {Wirel. Networks},
  volume       = {26},
  number       = {5},
  pages        = {3169--3182},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11276-019-02129-w},
  doi          = {10.1007/S11276-019-02129-W},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/FangZCLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/KhedrHKA20,
  author       = {Walid I. Khedr and
                  Khalid M. Hosny and
                  Marwa M. Khashaba and
                  Fathy A. Amer},
  title        = {Prediction-based secured handover authentication for mobile cloud
                  computing},
  journal      = {Wirel. Networks},
  volume       = {26},
  number       = {6},
  pages        = {4657--4675},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11276-020-02368-2},
  doi          = {10.1007/S11276-020-02368-2},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/KhedrHKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/SuTWL20,
  author       = {Yunxuan Su and
                  Zheng Tu and
                  Xu An Wang and
                  Ruifeng Li},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Tomoki Yoshihisa and
                  Flora Amato and
                  Makoto Ikeda},
  title        = {Secure Outsourcing Protocol Based on Paillier Algorithm for Cloud
                  Computing},
  booktitle    = {Advances on P2P, Parallel, Grid, Cloud and Internet Computing - Proceedings
                  of the 15th International Conference on P2P, Parallel, Grid, Cloud
                  and Internet Computing (3PGCIC-2020), Yonago City, Tottori Prefecture,
                  Japan, October 28-30, 2020},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {158},
  pages        = {376--384},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61105-7\_38},
  doi          = {10.1007/978-3-030-61105-7\_38},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/3pgcic/SuTWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ZhaoWLLZ20,
  author       = {Kaiyang Zhao and
                  Xu An Wang and
                  Yao Liu and
                  Jiasen Liu and
                  Songyin Zhao},
  editor       = {Leonard Barolli and
                  Flora Amato and
                  Francesco Moscato and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {Secure Public Storage Auditing Protocol for Privacy-Preserving Fog-to-Cloud
                  Computing},
  booktitle    = {Web, Artificial Intelligence and Network Applications - Proceedings
                  of the Workshops of the 34th International Conference on Advanced
                  Information Networking and Applications, {AINA} Workshops 2020, Caserta,
                  Italy, 15-17 April},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1150},
  pages        = {138--148},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44038-1\_13},
  doi          = {10.1007/978-3-030-44038-1\_13},
  timestamp    = {Thu, 04 Apr 2024 17:08:34 +0200},
  biburl       = {https://dblp.org/rec/conf/aina/ZhaoWLLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atci/YangF20,
  author       = {Mei Yang and
                  Fancheng Fu},
  editor       = {Jemal H. Abawajy and
                  Kim{-}Kwang Raymond Choo and
                  Zheng Xu and
                  Mohammed Atiquzzaman},
  title        = {Secure Big Data Computing Based on Trusted Computing and Key Management},
  booktitle    = {2020 International Conference on Applications and Techniques in Cyber
                  Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI}
                  2020), Fuyang, China, 20-22 June, 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1244},
  pages        = {1114--1118},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-53980-1\_169},
  doi          = {10.1007/978-3-030-53980-1\_169},
  timestamp    = {Tue, 05 Apr 2022 12:05:39 +0200},
  biburl       = {https://dblp.org/rec/conf/atci/YangF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbd/YuLZW20,
  author       = {Feng Yu and
                  Xixian Li and
                  Huimin Zhang and
                  Li{-}e Wang},
  title        = {Secure Data Propagation in Edge-Cloud Orchestrated Computing Paradigms:
                  Statistcs and Taxonomy},
  booktitle    = {Eighth International Conference on Advanced Cloud and Big Data, {CBD}
                  2020, Taiyuan, China, December 5-6, 2020},
  pages        = {253--258},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CBD51900.2020.00053},
  doi          = {10.1109/CBD51900.2020.00053},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cbd/YuLZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cncert/ZhangSH20,
  author       = {Jiuling Zhang and
                  Shijun Shen and
                  Daochao Huang},
  editor       = {Wei Lu and
                  Qiaoyan Wen and
                  Yuqing Zhang and
                  Bo Lang and
                  Weiping Wen and
                  Hanbing Yan and
                  Chao Li and
                  Li Ding and
                  Ruiguang Li and
                  Yu Zhou},
  title        = {A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing},
  booktitle    = {Cyber Security - 17th China Annual Conference, {CNCERT} 2020, Beijing,
                  China, August 12, 2020, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1299},
  pages        = {29--36},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-33-4922-3\_3},
  doi          = {10.1007/978-981-33-4922-3\_3},
  timestamp    = {Thu, 15 Dec 2022 13:17:06 +0100},
  biburl       = {https://dblp.org/rec/conf/cncert/ZhangSH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LeiTLX20,
  author       = {Xinyu Lei and
                  Guan{-}Hua Tu and
                  Alex X. Liu and
                  Tian Xie},
  title        = {Fast and Secure kNN Query Processing in Cloud Computing},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162307},
  doi          = {10.1109/CNS48642.2020.9162307},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LeiTLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ChengDLWG20,
  author       = {Cong Cheng and
                  Huan Dai and
                  Lingzhi Li and
                  Jin Wang and
                  Fei Gu},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Muddesar Iqbal and
                  Yuyu Yin and
                  Jianwei Yin and
                  Ning Gu},
  title        = {The Design and Implementation of Secure Distributed Image Classification
                  Model Training System for Heterogenous Edge Computing},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 16th {EAI} International Conference, CollaborateCom 2020, Shanghai,
                  China, October 16-18, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {349},
  pages        = {179--198},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-67537-0\_12},
  doi          = {10.1007/978-3-030-67537-0\_12},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ChengDLWG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cyberc/WangZL20,
  author       = {Jingzhong Wang and
                  Yue Zhang and
                  Haibin Li},
  title        = {Electronic voting protocol based on ring signature and secure multi-party
                  computing},
  booktitle    = {International Conference on Cyber-Enabled Distributed Computing and
                  Knowledge Discovery, CyberC 2020, Chongqing, China, October 29-30,
                  2020},
  pages        = {50--55},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CyberC49757.2020.00018},
  doi          = {10.1109/CYBERC49757.2020.00018},
  timestamp    = {Tue, 02 Feb 2021 11:46:01 +0100},
  biburl       = {https://dblp.org/rec/conf/cyberc/WangZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/0001PCUMCCBJANM20,
  author       = {Behzad Salami and
                  Konstantinos Parasyris and
                  Adri{\'{a}}n Cristal and
                  Osman S. Unsal and
                  Xavier Martorell and
                  Paul Carpenter and
                  Ra{\'{u}}l de la Cruz and
                  Leonardo Bautista{-}Gomez and
                  Daniel A. Jim{\'{e}}nez and
                  Carlos {\'{A}}lvarez and
                  Seyed Saber Nabavi Larimi and
                  Sergi Madonar and
                  Miquel Peric{\`{a}}s and
                  Pedro Trancoso and
                  Mustafa Abduljabbar and
                  Jing Chen and
                  Pirah Noor Soomro and
                  Madhavan Manivannan and
                  Micha vor dem Berge and
                  Stefan Krupop and
                  Frank Klawonn and
                  Al Mekhlafi and
                  Sigrun May and
                  Tobias Becker and
                  Georgi Gaydadjiev and
                  Hans Salomonsson and
                  Devdatt P. Dubhashi and
                  Oron Port and
                  Yoav Etsion and
                  Do Le Quoc and
                  Christof Fetzer and
                  Martin Kaiser and
                  Nils Kucza and
                  Jens Hagemeyer and
                  Ren{\'{e}} Griessl and
                  Lennart Tigges and
                  Kevin Mika and
                  A. H{\"{u}}ffmeier and
                  Marcelo Pasin and
                  Valerio Schiavoni and
                  Isabelly Rocha and
                  Christian G{\"{o}}ttel and
                  Pascal Felber},
  title        = {LEGaTO: Low-Energy, Secure, and Resilient Toolset for Heterogeneous
                  Computing},
  booktitle    = {2020 Design, Automation {\&} Test in Europe Conference {\&}
                  Exhibition, {DATE} 2020, Grenoble, France, March 9-13, 2020},
  pages        = {169--174},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/DATE48585.2020.9116362},
  doi          = {10.23919/DATE48585.2020.9116362},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/0001PCUMCCBJANM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AgrawalGKP20,
  author       = {Shweta Agrawal and
                  Rachit Garg and
                  Nishant Kumar and
                  Manoj Prabhakaran},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {A Practical Model for Collaborative Databases: Securely Mixing, Searching
                  and Computing},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {42--63},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_3},
  doi          = {10.1007/978-3-030-58951-6\_3},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AgrawalGKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/IonKNPSS0SY20,
  author       = {Mihaela Ion and
                  Ben Kreuter and
                  Ahmet Erhan Nergiz and
                  Sarvar Patel and
                  Shobhit Saxena and
                  Karn Seth and
                  Mariana Raykova and
                  David Shanahan and
                  Moti Yung},
  title        = {On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2020, Genoa, Italy, September 7-11, 2020},
  pages        = {370--389},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/EuroSP48549.2020.00031},
  doi          = {10.1109/EUROSP48549.2020.00031},
  timestamp    = {Tue, 10 Nov 2020 11:45:04 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/IonKNPSS0SY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HewaBYL20,
  author       = {Tharaka Mawanane Hewa and
                  An Braeken and
                  Mika Ylianttila and
                  Madhusanka Liyanage},
  title        = {Multi-Access Edge Computing and Blockchain-based Secure Telehealth
                  System Connected with 5G and IoT},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual
                  Event, Taiwan, December 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GLOBECOM42002.2020.9348125},
  doi          = {10.1109/GLOBECOM42002.2020.9348125},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HewaBYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RoshanM0MT20,
  author       = {Rishu Roshan and
                  Rakesh Matam and
                  Mithun Mukherjee and
                  Jaime Lloret Mauri and
                  Somanath Tripathy},
  title        = {A secure task-offloading framework for cooperative fog computing environment},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual
                  Event, Taiwan, December 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/GLOBECOM42002.2020.9322509},
  doi          = {10.1109/GLOBECOM42002.2020.9322509},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/RoshanM0MT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/YelluBXY20,
  author       = {Pruthvy Yellu and
                  Landon Buell and
                  Dongpeng Xu and
                  Qiaoyan Yu},
  editor       = {Tinoosh Mohsenin and
                  Weisheng Zhao and
                  Yiran Chen and
                  Onur Mutlu},
  title        = {Blurring Boundaries: {A} New Way to Secure Approximate Computing Systems},
  booktitle    = {{GLSVLSI} '20: Great Lakes Symposium on {VLSI} 2020, Virtual Event,
                  China, September 7-9, 2020},
  pages        = {327--332},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386263.3407593},
  doi          = {10.1145/3386263.3407593},
  timestamp    = {Mon, 04 Jul 2022 14:19:34 +0200},
  biburl       = {https://dblp.org/rec/conf/glvlsi/YelluBXY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icact/TsaiCCMH20,
  author       = {Wang{-}You Tsai and
                  Tzu{-}Chuan Chou and
                  Jiann{-}Liang Chen and
                  Yi{-}Wei Ma and
                  Chen{-}Jui Huang},
  title        = {Blockchain as a Platform for Secure Cloud Computing Services},
  booktitle    = {22nd International Conference on Advanced Communication Technology,
                  {ICACT} 2020, Phoenix Park, PyeongChang, Korea (South), February 16-19,
                  2020},
  pages        = {155--158},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICACT48636.2020.9061435},
  doi          = {10.23919/ICACT48636.2020.9061435},
  timestamp    = {Mon, 21 Mar 2022 08:04:55 +0100},
  biburl       = {https://dblp.org/rec/conf/icact/TsaiCCMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbta/HouLLWZX20,
  author       = {Yujiao Hou and
                  Mengxiao Luo and
                  Yutong Liu and
                  Ning Wang and
                  Jinjin Zhang and
                  Weisheng Xu},
  title        = {Secure and Privacy-Preserving Data Computing Scheme Based on Blockchain
                  for Double-Loop Governance of Smart Society},
  booktitle    = {{ICBTA} 2020: The 3rd International Conference on Blockchain Technology
                  and Applications, Xi'an, China, December, 2020},
  pages        = {75--80},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3446983.3446995},
  doi          = {10.1145/3446983.3446995},
  timestamp    = {Tue, 08 Mar 2022 14:42:53 +0100},
  biburl       = {https://dblp.org/rec/conf/icbta/HouLLWZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChenCWLX20,
  author       = {Zunming Chen and
                  Hongyan Cui and
                  Ensen Wu and
                  Yuanxin Li and
                  Yu Xi},
  title        = {Secure Distributed Data Management for Fog Computing in Large-Scale
                  IoT Application: {A} Blockchain-Based Solution},
  booktitle    = {2020 {IEEE} International Conference on Communications Workshops,
                  {ICC} Workshops 2020, Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICCWorkshops49005.2020.9145381},
  doi          = {10.1109/ICCWORKSHOPS49005.2020.9145381},
  timestamp    = {Fri, 31 Jul 2020 09:47:51 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChenCWLX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChenSC20,
  author       = {Jiajun Chen and
                  Chi Wan Sung and
                  Terence H. Chan},
  title        = {Storage and Computation: {A} Tradeoff in Secure Distributed Computing},
  booktitle    = {2020 {IEEE} International Conference on Communications, {ICC} 2020,
                  Dublin, Ireland, June 7-11, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICC40277.2020.9149183},
  doi          = {10.1109/ICC40277.2020.9149183},
  timestamp    = {Mon, 22 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChenSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YinYTWRAA20,
  author       = {Mingxi Yin and
                  Jinliang Yu and
                  Shanshan Tu and
                  Muhammad Waqas and
                  Sadaqat ur Rehman and
                  Ghulam Abbas and
                  Ziaul Haq Abbas},
  editor       = {Xingming Sun and
                  Jinwei Wang and
                  Elisa Bertino},
  title        = {An Efficient Approach for Selecting a Secure Relay Node in Fog Computing
                  Social Ties Network},
  booktitle    = {Artificial Intelligence and Security - 6th International Conference,
                  {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12239},
  pages        = {173--183},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57884-8\_16},
  doi          = {10.1007/978-3-030-57884-8\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccsec/YinYTWRAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icea/KimP20,
  author       = {Seong{-}Jin Kim and
                  Ki{-}Woong Park},
  title        = {Blueprint for a Secure Container to Protect Data in Edge Cloud Computing
                  Environment},
  booktitle    = {{ACM} {ICEA} '20: 2020 {ACM} International Conference on Intelligent
                  Computing and its Emerging Applications, GangWon Republic of Korea,
                  December 12 - 15, 2020},
  pages        = {33:1--33:3},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3440943.3444355},
  doi          = {10.1145/3440943.3444355},
  timestamp    = {Wed, 29 Sep 2021 09:35:11 +0200},
  biburl       = {https://dblp.org/rec/conf/icea/KimP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/GuanGL020,
  author       = {Yue Guan and
                  Songtao Guo and
                  Pan Li and
                  Yuanyuan Yang},
  title        = {Secure and Verifiable Data Access Control Scheme With Policy Update
                  and Computation Outsourcing for Edge Computing},
  booktitle    = {26th {IEEE} International Conference on Parallel and Distributed Systems,
                  {ICPADS} 2020, Hong Kong, December 2-4, 2020},
  pages        = {398--405},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICPADS51040.2020.00060},
  doi          = {10.1109/ICPADS51040.2020.00060},
  timestamp    = {Wed, 03 Mar 2021 11:21:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icpads/GuanGL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icteri/GnatyukIKOBG20,
  author       = {Sergiy Gnatyuk and
                  Maksim Iavich and
                  Vasyl Kinzeryavyy and
                  Tetyana Okhrimenko and
                  Yuliia Burmak and
                  Iuliia Goncharenko},
  editor       = {Oleksandr Sokolov and
                  Grygoriy Zholtkevych and
                  Vitaliy Yakovyna and
                  Yulia Tarasich and
                  Vyacheslav Kharchenko and
                  Vitaliy Kobets and
                  Olexandr Burov and
                  Serhiy Semerikov and
                  Hennadiy Kravtsov},
  title        = {Improved Secure Stream Cipher for Cloud Computing},
  booktitle    = {Proceedings of the 16th International Conference on {ICT} in Education,
                  Research and Industrial Applications. Integration, Harmonization and
                  Knowledge Transfer. Volume {II:} Workshops, Kharkiv, Ukraine, October
                  06-10, 2020},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2732},
  pages        = {183--197},
  publisher    = {CEUR-WS.org},
  year         = {2020},
  url          = {https://ceur-ws.org/Vol-2732/20200183.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icteri/GnatyukIKOBG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/BosriUOBR20,
  author       = {Rabeya Bosri and
                  Abdur Razzak Uzzal and
                  Abdullah Al Omar and
                  Md. Zakirul Alam Bhuiyan and
                  Mohammad Shahriar Rahman},
  title        = {HIDEchain: {A} User-Centric Secure Edge Computing Architecture for
                  Healthcare IoT Devices},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} Workshops
                  2020, Toronto, ON, Canada, July 6-9, 2020},
  pages        = {376--381},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOMWKSHPS50562.2020.9162729},
  doi          = {10.1109/INFOCOMWKSHPS50562.2020.9162729},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/BosriUOBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iniscom/HaTH20,
  author       = {Dac{-}Binh Ha and
                  Van{-}Truong Truong and
                  Duy{-}Hung Ha},
  editor       = {Nguyen{-}Son Vo and
                  Van{-}Phuc Hoang},
  title        = {A Novel Secure Protocol for Mobile Edge Computing Network Applied
                  Downlink {NOMA}},
  booktitle    = {Industrial Networks and Intelligent Systems - 6th {EAI} International
                  Conference, {INISCOM} 2020, Hanoi, Vietnam, August 27-28, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {334},
  pages        = {324--336},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63083-6\_25},
  doi          = {10.1007/978-3-030-63083-6\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iniscom/HaTH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/ChanCLS20,
  author       = {T.{-}H. Hubert Chan and
                  Kai{-}Min Chung and
                  Wei{-}Kai Lin and
                  Elaine Shi},
  editor       = {Thomas Vidick},
  title        = {{MPC} for {MPC:} Secure Computation on a Massively Parallel Computing
                  Architecture},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {75:1--75:52},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.75},
  doi          = {10.4230/LIPICS.ITCS.2020.75},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/ChanCLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/YelluY20,
  author       = {Pruthvy Yellu and
                  Qiaoyan Yu},
  title        = {Can We Securely Use Approximate Computing?},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2020,
                  Sevilla, Spain, October 10-21, 2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISCAS45731.2020.9180840},
  doi          = {10.1109/ISCAS45731.2020.9180840},
  timestamp    = {Mon, 18 Jan 2021 08:38:59 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/YelluY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isocc/HoPLCG20,
  author       = {Weng{-}Geng Ho and
                  Ali Akbar Pammu and
                  Ne Kyaw Zwa Lwin and
                  Kwen{-}Siong Chong and
                  Bah{-}Hwee Gwee},
  title        = {High Throughput and Secure Authentication-Encryption on Asynchronous
                  Multicore Processor for Edge Computing IoT Applications},
  booktitle    = {International SoC Design Conference, {ISOCC} 2020, Yeosu, South Korea,
                  October 21-24, 2020},
  pages        = {173--174},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISOCC50952.2020.9333008},
  doi          = {10.1109/ISOCC50952.2020.9333008},
  timestamp    = {Fri, 12 Feb 2021 11:57:12 +0100},
  biburl       = {https://dblp.org/rec/conf/isocc/HoPLCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/DongWGZLW20,
  author       = {Tingting Dong and
                  Jin Wang and
                  Fei Gu and
                  Jingya Zhou and
                  Kejie Lu and
                  Jianping Wang},
  editor       = {Jia Hu and
                  Geyong Min and
                  Nektarios Georgalas and
                  Zhiwei Zhao and
                  Fei Hao and
                  Wang Miao},
  title        = {{MCSEC:} Secure Coded Matrix Multiplication Scheme for Edge Computing
                  with Minimum Communication Cost},
  booktitle    = {{IEEE} International Conference on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking,
                  ISPA/BDCloud/SocialCom/SustainCom 2020, Exeter, United Kingdom, December
                  17-19, 2020},
  pages        = {192--199},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00050},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM51426.2020.00050},
  timestamp    = {Tue, 17 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/DongWGZLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iticse/BlairCRS20,
  author       = {Jean R. S. Blair and
                  Christa M. Chewar and
                  Rajendra K. Raj and
                  Edward Sobiesk},
  editor       = {Michail N. Giannakos and
                  Guttorm Sindre and
                  Andrew Luxton{-}Reilly and
                  Monica Divitini},
  title        = {Infusing Principles and Practices for Secure Computing Throughout
                  an Undergraduate Computer Science Curriculum},
  booktitle    = {Proceedings of the 2020 {ACM} Conference on Innovation and Technology
                  in Computer Science Education, ITiCSE 2020, Trondheim, Norway, June
                  15-19, 2020},
  pages        = {82--88},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341525.3387426},
  doi          = {10.1145/3341525.3387426},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iticse/BlairCRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/XuLLZY20,
  author       = {Jia Xu and
                  Xiao Liu and
                  Xuejun Li and
                  Lei Zhang and
                  Yun Yang},
  title        = {Express: An Energy-Efficient and Secure Framework for Mobile Edge
                  Computing and Blockchain based Smart Systems**This research is in
                  part supported by the National Natural Science Foundation of China
                  Project No. 61972001},
  booktitle    = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2020, Melbourne, Australia, September 21-25, 2020},
  pages        = {1283--1286},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3324884.3415294},
  doi          = {10.1145/3324884.3415294},
  timestamp    = {Thu, 01 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kbse/XuLLZY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/medes/AlamerBH20,
  author       = {Abdulrahman Alamer and
                  Sultan Basudan and
                  Patrick C. K. Hung},
  editor       = {Richard Chbeir and
                  Yannis Manolopoulos and
                  Ernesto Damiani and
                  Djamal Benslimane and
                  Ladjel Bellatreche and
                  Tadeusz Morzy},
  title        = {A Secure Tracing Method in Fog Computing Network for the IoT Devices},
  booktitle    = {{MEDES} '20: 12th International Conference on Management of Digital
                  EcoSystems, Virtual Event, United Arab Emirates, 2-4 November, 2020},
  pages        = {104--110},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3415958.3433074},
  doi          = {10.1145/3415958.3433074},
  timestamp    = {Tue, 01 Dec 2020 15:24:04 +0100},
  biburl       = {https://dblp.org/rec/conf/medes/AlamerBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/micro/DangwalCALRT20,
  author       = {Deeksha Dangwal and
                  Meghan Cowan and
                  Armin Alaghi and
                  Vincent T. Lee and
                  Brandon Reagen and
                  Caroline Trippel},
  editor       = {Jakub Szefer and
                  Weidong Shi and
                  Ruby B. Lee},
  title        = {SoK: Opportunities for Software-Hardware-Security Codesign for Next
                  Generation Secure Computing},
  booktitle    = {HASP@MICRO 2020: Hardware and Architectural Support for Security and
                  Privacy, Virtual Event, Greece, 17 October 2020},
  pages        = {8:1--8:9},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3458903.3458911},
  doi          = {10.1145/3458903.3458911},
  timestamp    = {Tue, 26 Oct 2021 15:43:33 +0200},
  biburl       = {https://dblp.org/rec/conf/micro/DangwalCALRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/WuXLZ20,
  author       = {Fan Wu and
                  Zhuoqun Xu and
                  Huanghe Liu and
                  Zongwei Zhu},
  editor       = {Xiaofeng Chen and
                  Hongyang Yan and
                  Qiben Yan and
                  Xiangliang Zhang},
  title        = {Machine Learning Agricultural Application Based on the Secure Edge
                  Computing Platform},
  booktitle    = {Machine Learning for Cyber Security - Third International Conference,
                  {ML4CS} 2020, Guangzhou, China, October 8-10, 2020, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12486},
  pages        = {206--220},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62223-7\_18},
  doi          = {10.1007/978-3-030-62223-7\_18},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ml4cs/WuXLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/Ogiela0O20,
  author       = {Lidia Ogiela and
                  Makoto Takizawa and
                  Urszula Ogiela},
  editor       = {Leonard Barolli and
                  Kin Fun Li and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {Secure Cognitive Protocols for Data Fusion in Transformative Computing},
  booktitle    = {Advances in Networked-Based Information Systems - The 23rd International
                  Conference on Network-Based Information Systems, NBiS 2020, Victoria,
                  BC, Canada, 31 August - 2 September 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1264},
  pages        = {89--93},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57811-4\_9},
  doi          = {10.1007/978-3-030-57811-4\_9},
  timestamp    = {Fri, 21 Aug 2020 15:16:47 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/Ogiela0O20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsdi/HuntJMSHRW20,
  author       = {Tyler Hunt and
                  Zhipeng Jia and
                  Vance Miller and
                  Ariel Szekely and
                  Yige Hu and
                  Christopher J. Rossbach and
                  Emmett Witchel},
  editor       = {Ranjita Bhagwan and
                  George Porter},
  title        = {Telekine: Secure Computing with Cloud GPUs},
  booktitle    = {17th {USENIX} Symposium on Networked Systems Design and Implementation,
                  {NSDI} 2020, Santa Clara, CA, USA, February 25-27, 2020},
  pages        = {817--833},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/nsdi20/presentation/hunt},
  timestamp    = {Tue, 02 Feb 2021 08:04:59 +0100},
  biburl       = {https://dblp.org/rec/conf/nsdi/HuntJMSHRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdp/KotenkoSS20,
  author       = {Igor V. Kotenko and
                  Yury Sineshchuk and
                  Igor Saenko},
  title        = {Optimizing Secure Information Interaction in Distributed Computing
                  Systems by the Sequential Concessions Method},
  booktitle    = {28th Euromicro International Conference on Parallel, Distributed and
                  Network-Based Processing, {PDP} 2020, V{\"{a}}ster{\aa}s, Sweden,
                  March 11-13, 2020},
  pages        = {429--432},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/PDP50117.2020.00072},
  doi          = {10.1109/PDP50117.2020.00072},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdp/KotenkoSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sc/PierceM20,
  author       = {Marlon E. Pierce and
                  Suresh Marru},
  title        = {Integrating Science Gateways with Secure Cloud Computing Resources:
                  An Examination of Two Deployment Patterns and Their Requirements},
  booktitle    = {{IEEE/ACM} International Workshop on {HPC} User Support Tools and
                  Workshop on Programming and Performance Visualization Tools, HUST/ProTools@SC
                  2020, Atlanta, GA, USA, November 18, 2020},
  pages        = {19--26},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/HUSTProtools51951.2020.00010},
  doi          = {10.1109/HUSTPROTOOLS51951.2020.00010},
  timestamp    = {Fri, 30 Apr 2021 12:35:39 +0200},
  biburl       = {https://dblp.org/rec/conf/sc/PierceM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sgiot/ZhaoZL20,
  author       = {Yao Zhao and
                  Zhenjiang Zhang and
                  Jian Li},
  editor       = {Yi{-}Bing Lin and
                  Der{-}Jiunn Deng},
  title        = {A Secure Edge-Cloud Computing Framework for IoT Applications},
  booktitle    = {Smart Grid and Internet of Things - 4th {EAI} International Conference,
                  SGIoT 2020, TaiChung, Taiwan, December 5-6, 2020, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {354},
  pages        = {70--78},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-69514-9\_7},
  doi          = {10.1007/978-3-030-69514-9\_7},
  timestamp    = {Thu, 15 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sgiot/ZhaoZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartiot/KhanKS20,
  author       = {Umar Ajaib Khan and
                  Waqas Khalid and
                  Saifullah Saifullah},
  title        = {Energy Efficient Resource Allocation and Computation Offloading Strategy
                  in a UAV-enabled Secure Edge-Cloud Computing System},
  booktitle    = {2020 {IEEE} International Conference on Smart Internet of Things,
                  SmartIoT 2020, Beijing, China, August 14-16, 2020},
  pages        = {58--63},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SmartIoT49966.2020.00018},
  doi          = {10.1109/SMARTIOT49966.2020.00018},
  timestamp    = {Tue, 22 Sep 2020 09:48:21 +0200},
  biburl       = {https://dblp.org/rec/conf/smartiot/KhanKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socpar/JamilKR20,
  author       = {Syed Usman Jamil and
                  M. Arif Khan and
                  Sabih ur Rehman},
  editor       = {Ajith Abraham and
                  Yukio Ohsawa and
                  Niketa Gandhi and
                  M. Akhil Jabbar and
                  Abdelkrim Haqiq and
                  Se{\'{a}}n F. McLoone and
                  Biju Issac},
  title        = {Edge Computing Enabled Technologies for Secure 6G Smart Environment-An
                  Overview},
  booktitle    = {Proceedings of the 12th International Conference on Soft Computing
                  and Pattern Recognition (SoCPaR 2020), 15-18 December 2020},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1383},
  pages        = {934--945},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-73689-7\_88},
  doi          = {10.1007/978-3-030-73689-7\_88},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socpar/JamilKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spiot/MeiF20,
  author       = {Yang Mei and
                  Fancheng Fu},
  editor       = {John MacIntyre and
                  Jinghua Zhao and
                  Xiaomeng Ma},
  title        = {Secure Big Data Computing Based on Trusted Computing and Key Management},
  booktitle    = {The 2020 International Conference on Machine Learning and Big Data
                  Analytics for IoT Security and Privacy - SPIoT-2020, Shanghai, China,
                  6-8 November 2020, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1282},
  pages        = {484--489},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62743-0\_70},
  doi          = {10.1007/978-3-030-62743-0\_70},
  timestamp    = {Fri, 07 Jun 2024 09:52:08 +0200},
  biburl       = {https://dblp.org/rec/conf/spiot/MeiF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sscc/NambiarNTKK20,
  author       = {Seema Nambiar and
                  Nandakrishna and
                  Chirag Tubakad and
                  Adithya Kiran and
                  Subramaniam Kalambur},
  editor       = {Sabu M. Thampi and
                  Guojun Wang and
                  Danda B. Rawat and
                  Ryan K. L. Ko and
                  Chun{-}I Fan},
  title        = {Multilevel Secure Container Deployment Framework in Edge Computing},
  booktitle    = {Security in Computing and Communications - 8th International Symposium,
                  {SSCC} 2020, Chennai, India, October 14-17, 2020, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1364},
  pages        = {49--61},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-16-0422-5\_4},
  doi          = {10.1007/978-981-16-0422-5\_4},
  timestamp    = {Thu, 11 Feb 2021 15:38:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sscc/NambiarNTKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tamc/RuangwisesI20,
  author       = {Suthee Ruangwises and
                  Toshiya Itoh},
  editor       = {Jianer Chen and
                  Qilong Feng and
                  Jinhui Xu},
  title        = {Securely Computing the \emph{n}-Variable Equality Function with 2\emph{n}
                  Cards},
  booktitle    = {Theory and Applications of Models of Computation, 16th International
                  Conference, {TAMC} 2020, Changsha, China, October 18-20, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12337},
  pages        = {25--36},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59267-7\_3},
  doi          = {10.1007/978-3-030-59267-7\_3},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tamc/RuangwisesI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/Al-JodyHAK20,
  author       = {Taha Al{-}Jody and
                  Violeta Holmes and
                  Alexandros Antoniades and
                  Yazan Kazkouzeh},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Bearicade: secure access gateway to High Performance Computing systems},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {1420--1427},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00191},
  doi          = {10.1109/TRUSTCOM50675.2020.00191},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/Al-JodyHAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhangW20,
  author       = {Tianyi Zhang and
                  Jian Wang},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {576--583},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00082},
  doi          = {10.1109/TRUSTCOM50675.2020.00082},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhangW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhuWSZL020,
  author       = {Luqi Zhu and
                  Jin Wang and
                  Lianmin Shi and
                  Jingya Zhou and
                  Kejie Lu and
                  Jianping Wang},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Secure Coded Matrix Multiplication against Cooperative Attack in Edge
                  Computing},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {547--556},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00079},
  doi          = {10.1109/TRUSTCOM50675.2020.00079},
  timestamp    = {Thu, 24 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhuWSZL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vlsi-dat/NiiTO20,
  author       = {Koji Nii and
                  Yasuhiro Taniguchi and
                  Kosuke Okuyama},
  title        = {A Cost-Effective Embedded Nonvolatile Memory with Scalable {LEE} Flash\({}^{\mbox{{\textregistered}}}\)-G2
                  {SONOS} for Secure IoT and Computing-in-Memory (CiM) Applications},
  booktitle    = {2020 International Symposium on {VLSI} Design, Automation and Test,
                  {VLSI-DAT} 2020, Hsinchu, Taiwan, August 10-13, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VLSI-DAT49148.2020.9196270},
  doi          = {10.1109/VLSI-DAT49148.2020.9196270},
  timestamp    = {Tue, 29 Sep 2020 11:35:15 +0200},
  biburl       = {https://dblp.org/rec/conf/vlsi-dat/NiiTO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/HouWSLL20,
  author       = {Tao Hou and
                  Tao Wang and
                  Dakun Shen and
                  Zhuo Lu and
                  Yao Liu},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Autonomous Security Mechanisms for High-Performance Computing Systems:
                  Review and Analysis},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {109--129},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_6},
  doi          = {10.1007/978-3-030-33432-1\_6},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/20/HouWSLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/RaniS20,
  author       = {Sudesh Rani and
                  Poonam Saini},
  editor       = {Brij B. Gupta and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Dharma P. Agrawal and
                  Deepak Gupta},
  title        = {Fog Computing: Applications and Secure Data Aggregation},
  booktitle    = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms},
  pages        = {475--492},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-22277-2\_19},
  doi          = {10.1007/978-3-030-22277-2\_19},
  timestamp    = {Sun, 12 Nov 2023 02:22:31 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/RaniS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/StergiouPPG20,
  author       = {Christos Stergiou and
                  Andreas P. Plageras and
                  Konstantinos E. Psannis and
                  Brij B. Gupta},
  editor       = {Brij B. Gupta and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Dharma P. Agrawal and
                  Deepak Gupta},
  title        = {Secure Machine Learning Scenario from Big Data in Cloud Computing
                  via Internet of Things Network},
  booktitle    = {Handbook of Computer Networks and Cyber Security, Principles and Paradigms},
  pages        = {525--554},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-22277-2\_21},
  doi          = {10.1007/978-3-030-22277-2\_21},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/StergiouPPG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/VenkatesanSYCC20,
  author       = {Sridhar Venkatesan and
                  Shridatt Sugrim and
                  Jason A. Youzwak and
                  Cho{-}Yu Jason Chiang and
                  Ritu Chadha},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {A Framework for Studying Autonomic Computing Models in Cyber Deception},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {89--107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_5},
  doi          = {10.1007/978-3-030-33432-1\_5},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/VenkatesanSYCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TibaPZDKC20,
  author       = {Kevin Tiba and
                  Reza M. Parizi and
                  Qi Zhang and
                  Ali Dehghantanha and
                  Hadis Karimipour and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Secure Blockchain-Based Traffic Load Balancing Using Edge Computing
                  and Reinforcement Learning},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {99--128},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_6},
  doi          = {10.1007/978-3-030-38181-3\_6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/TibaPZDKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/apc/PetrakisM20,
  author       = {Euripides G. M. Petrakis and
                  George Myrizakis},
  editor       = {Fatos Xhafa and
                  Arun Kumar Sangaiah},
  title        = {iHome: Secure Smart Home Management in the Cloud and the Fog},
  booktitle    = {Advances in Edge Computing: Massive Parallel Processing and Applications},
  series       = {Advances in Parallel Computing},
  volume       = {35},
  pages        = {237--263},
  publisher    = {{IOS} Press},
  year         = {2020},
  url          = {https://doi.org/10.3233/APC200010},
  doi          = {10.3233/APC200010},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/apc/PetrakisM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2020,
  title        = {{IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, Intl
                  Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and
                  Big Data Computing, Intl Conf on Cyber Science and Technology Congress,
                  DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22,
                  2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9251108/proceeding},
  isbn         = {978-1-7281-6609-4},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-14166,
  author       = {Angelo Vera Rivera and
                  Ahmed Refaey and
                  Ekram Hossain},
  title        = {A Blockchain Framework for Secure Task Sharing in Multi-access Edge
                  Computing},
  journal      = {CoRR},
  volume       = {abs/2006.14166},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.14166},
  eprinttype    = {arXiv},
  eprint       = {2006.14166},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-14166.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-13644,
  author       = {Sergio Rajsbaum},
  title        = {A Distributed Computing Perspective of Unconditionally Secure Information
                  Transmission in Russian Cards Problems},
  journal      = {CoRR},
  volume       = {abs/2009.13644},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.13644},
  eprinttype    = {arXiv},
  eprint       = {2009.13644},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-13644.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-14747,
  author       = {Donghyun Yu and
                  Ruei{-}Hau Hsu and
                  Jemin Lee},
  title        = {{EC-SVC:} Secure {CAN} Bus In-Vehicle Communications with Fine-grained
                  Access Control Based on Edge Computing},
  journal      = {CoRR},
  volume       = {abs/2010.14747},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.14747},
  eprinttype    = {arXiv},
  eprint       = {2010.14747},
  timestamp    = {Mon, 02 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-14747.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-03461,
  author       = {Lei Wang and
                  Xin Liu and
                  Yin Zhang},
  title        = {A Distributed and Secure Algorithm for Computing Dominant {SVD} Based
                  on Projection Splitting},
  journal      = {CoRR},
  volume       = {abs/2012.03461},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.03461},
  eprinttype    = {arXiv},
  eprint       = {2012.03461},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-03461.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-13807,
  author       = {Mengmeng Yang and
                  Ivan Tjuawinata and
                  Kwok{-}Yan Lam and
                  Jun Zhao and
                  Lin Sun},
  title        = {Secure Hot Path Crowdsourcing with Local Differential Privacy under
                  Fog Computing Architecture},
  journal      = {CoRR},
  volume       = {abs/2012.13807},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.13807},
  eprinttype    = {arXiv},
  eprint       = {2012.13807},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-13807.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChanCLS20,
  author       = {T.{-}H. Hubert Chan and
                  Kai{-}Min Chung and
                  Wei{-}Kai Lin and
                  Elaine Shi},
  title        = {{MPC} for {MPC:} Secure Computation on a Massively Parallel Computing
                  Architecture},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChanCLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RakeeiM20a,
  author       = {Mohammad Amin Rakeei and
                  Farokhlagha Moazami},
  title        = {An efficient and provably secure authenticated key agreement scheme
                  for mobile edge computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1566},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1566},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RakeeiM20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ShobanaSK20,
  title        = {An enhanced soft computing-based formulation for secure data aggregation
                  and efficient data processing in large-scale wireless sensor network},
  journal      = {Soft Comput.},
  volume       = {24},
  number       = {16},
  pages        = {12541--12552},
  year         = {2020},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s00500-020-04694-1},
  doi          = {10.1007/S00500-020-04694-1},
  timestamp    = {Sat, 24 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ShobanaSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/VeerabathiranMK20,
  title        = {Improving secured ID-based authentication for cloud computing through
                  novel hybrid fuzzy-based homomorphic proxy re-encryption},
  journal      = {Soft Comput.},
  volume       = {24},
  number       = {24},
  pages        = {18893--18908},
  year         = {2020},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s00500-020-05119-9},
  doi          = {10.1007/S00500-020-05119-9},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/VeerabathiranMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Alqahtani19b,
  author       = {Hassan Saad Alqahtani},
  title        = {A novel approach to providing secure data storage using multi cloud
                  computing},
  school       = {University of Bedfordshire, {UK}},
  year         = {2019},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.831373},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Alqahtani19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/utcs/Kizza19,
  author       = {Joseph Migga Kizza},
  title        = {Ethical and Secure Computing - {A} Concise Module, Second Edition},
  series       = {Undergraduate Topics in Computer Science},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-03937-0},
  doi          = {10.1007/978-3-030-03937-0},
  isbn         = {978-3-030-03936-3},
  timestamp    = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/utcs/Kizza19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DewantaM19,
  author       = {Favian Dewanta and
                  Masahiro Mambo},
  title        = {A Mutual Authentication Scheme for Secure Fog Computing Service Handover
                  in Vehicular Network Environment},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {103095--103114},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2931217},
  doi          = {10.1109/ACCESS.2019.2931217},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DewantaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ElminaamAH19,
  author       = {Diaa Salama Abd Elminaam and
                  Farah Turkey Alanezi and
                  Khalid M. Hosny},
  title        = {{SMCACC:} Developing an Efficient Dynamic Secure Framework for Mobile
                  Capabilities Augmentation Using Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {120214--120237},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2929954},
  doi          = {10.1109/ACCESS.2019.2929954},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ElminaamAH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/GeZXSS19,
  author       = {Chunpeng Ge and
                  Lu Zhou and
                  Jinyue Xia and
                  Pawel Szalachowski and
                  Chunhua Su},
  title        = {A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {137266--137278},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2942651},
  doi          = {10.1109/ACCESS.2019.2942651},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GeZXSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiLWG19,
  author       = {Dawei Li and
                  Jianwei Liu and
                  Qianhong Wu and
                  Zhenyu Guan},
  title        = {Efficient {CCA2} Secure Flexible and Publicly-Verifiable Fine-Grained
                  Access Control in Fog Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {11688--11697},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2890976},
  doi          = {10.1109/ACCESS.2019.2890976},
  timestamp    = {Tue, 27 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiLWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LinCZL19,
  author       = {Hongcheng Lin and
                  Ye Cao and
                  Yijie Zhong and
                  Pengpeng Liu},
  title        = {Secure Computation Efficiency Maximization in NOMA-Enabled Mobile
                  Edge Computing Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {87504--87512},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2925808},
  doi          = {10.1109/ACCESS.2019.2925808},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LinCZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SiabiBS19,
  author       = {Babak Siabi and
                  Mehdi Berenjkoub and
                  Willy Susilo},
  title        = {Optimally Efficient Secure Scalar Product With Applications in Cloud
                  Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {42798--42815},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2908230},
  doi          = {10.1109/ACCESS.2019.2908230},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SiabiBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WeiLWG19,
  author       = {Zhijun Wei and
                  Jin Li and
                  Xianmin Wang and
                  Chong{-}Zhi Gao},
  title        = {A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure
                  Outsourcing Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {62785--62793},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2915794},
  doi          = {10.1109/ACCESS.2019.2915794},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WeiLWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/PuthalS19,
  author       = {Deepak Puthal and
                  Suraj Sharma},
  title        = {Introduction to the Special Section on Secure and Scalable Fog/Edge
                  Computing},
  journal      = {Comput. Electr. Eng.},
  volume       = {77},
  pages        = {420--422},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compeleceng.2019.06.005},
  doi          = {10.1016/J.COMPELECENG.2019.06.005},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/PuthalS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/GopeLHQ19,
  author       = {Prosanta Gope and
                  Jemin Lee and
                  Ruei{-}Hau Hsu and
                  Tony Q. S. Quek},
  title        = {Anonymous Communications for Secure Device-to-Device-Aided Fog Computing:
                  Architecture, Challenges, and Solutions},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {8},
  number       = {3},
  pages        = {10--16},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCE.2019.2892285},
  doi          = {10.1109/MCE.2019.2892285},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/GopeLHQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/GuanZSZWMR19,
  author       = {Zhitao Guan and
                  Yue Zhang and
                  Guanlin Si and
                  Zhenyu Zhou and
                  Jun Wu and
                  Shahid Mumtaz and
                  Jonathan Rodriguez},
  title        = {{ECOSECURITY:} Tackling Challenges Related to Data Exchange and Security:
                  An Edge-Computing-Enabled Secure and Efficient Data Exchange Architecture
                  for the Energy Internet},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {8},
  number       = {2},
  pages        = {61--65},
  year         = {2019},
  url          = {https://doi.org/10.1109/MCE.2018.2880824},
  doi          = {10.1109/MCE.2018.2880824},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/GuanZSZWMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/LuoM19,
  author       = {Wei Luo and
                  Wenping Ma},
  title        = {Secure and efficient proxy re-encryption scheme based on key-homomorphic
                  constrained PRFs in cloud computing},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {2},
  pages        = {541--551},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-2862-z},
  doi          = {10.1007/S10586-018-2862-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/LuoM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/PugazhenthiC19,
  author       = {A. Pugazhenthi and
                  D. Chitra},
  title        = {Secured and memory overhead controlled data authentication mechanism
                  in cloud computing},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {6},
  pages        = {13559--13567},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-2000-y},
  doi          = {10.1007/S10586-018-2000-Y},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/PugazhenthiC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AbedSE19,
  author       = {Sa'ed Abed and
                  Mohammad H. Al Shayeji and
                  Fahad Ebrahim},
  title        = {A secure and energy-efficient platform for the integration of Wireless
                  Sensor Networks and Mobile Cloud Computing},
  journal      = {Comput. Networks},
  volume       = {165},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comnet.2019.106956},
  doi          = {10.1016/J.COMNET.2019.106956},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/AbedSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/PanCWXZ19,
  author       = {Jingwen Pan and
                  Jie Cui and
                  Lu Wei and
                  Yan Xu and
                  Hong Zhong},
  title        = {Secure data sharing scheme for VANETs based on edge computing},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2019},
  pages        = {169},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13638-019-1494-1},
  doi          = {10.1186/S13638-019-1494-1},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejwcn/PanCWXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/entropy/XiLSM19,
  author       = {Ning Xi and
                  Jing Lv and
                  Cong Sun and
                  Jianfeng Ma},
  title        = {Secure Service Composition with Quantitative Information Flow Evaluation
                  in Mobile Computing Environments},
  journal      = {Entropy},
  volume       = {21},
  number       = {8},
  pages        = {753},
  year         = {2019},
  url          = {https://doi.org/10.3390/e21080753},
  doi          = {10.3390/E21080753},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entropy/XiLSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/FanLLTN19,
  author       = {Yongkai Fan and
                  Xiaodong Lin and
                  Wei Liang and
                  Gang Tan and
                  Priyadarsi Nanda},
  title        = {A secure privacy preserving deduplication scheme for cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {101},
  pages        = {127--135},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.04.046},
  doi          = {10.1016/J.FUTURE.2019.04.046},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/FanLLTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WazidDKV19,
  author       = {Mohammad Wazid and
                  Ashok Kumar Das and
                  Neeraj Kumar and
                  Athanasios V. Vasilakos},
  title        = {Design of secure key management and user authentication scheme for
                  fog computing services},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {91},
  pages        = {475--492},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2018.09.017},
  doi          = {10.1016/J.FUTURE.2018.09.017},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WazidDKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/XiongZPZY19,
  author       = {Hu Xiong and
                  Yanan Zhao and
                  Li Peng and
                  Hao Zhang and
                  Kuo{-}Hui Yeh},
  title        = {Partially policy-hidden attribute-based broadcast encryption with
                  secure delegation in edge computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {97},
  pages        = {453--461},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.03.008},
  doi          = {10.1016/J.FUTURE.2019.03.008},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/XiongZPZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/CostaB19,
  author       = {Pedro A. R. S. Costa and
                  Marko Beko},
  title        = {Dependable and Secure Voting Mechanism in Edge Computing},
  journal      = {Future Internet},
  volume       = {11},
  number       = {12},
  pages        = {262},
  year         = {2019},
  url          = {https://doi.org/10.3390/fi11120262},
  doi          = {10.3390/FI11120262},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fi/CostaB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaip/MondalMCK19,
  author       = {Bhaskar Mondal and
                  Tarni Mandal and
                  Tanupriya Choudhury and
                  Danish Ali Khan},
  title        = {Use of 'A light weight secure image encryption scheme based on chaos
                  and {DNA} computing' for encrypted audio watermarking},
  journal      = {Int. J. Adv. Intell. Paradigms},
  volume       = {13},
  number       = {1/2},
  pages        = {67--79},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJAIP.2019.099944},
  doi          = {10.1504/IJAIP.2019.099944},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaip/MondalMCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbidm/PrabhuU19,
  author       = {A. Prabhu and
                  M. Usha},
  title        = {A secured best data centre selection in cloud computing using encryption
                  technique},
  journal      = {Int. J. Bus. Intell. Data Min.},
  volume       = {14},
  number       = {1/2},
  pages        = {199--217},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJBIDM.2019.096804},
  doi          = {10.1504/IJBIDM.2019.096804},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbidm/PrabhuU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbidm/SathishkumarV19,
  author       = {P. Sathishkumar and
                  V. Venkatachalam},
  title        = {Trust management scheme for authentication in secure cloud computing
                  using double encryption method},
  journal      = {Int. J. Bus. Intell. Data Min.},
  volume       = {15},
  number       = {1},
  pages        = {49--70},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJBIDM.2017.10008075},
  doi          = {10.1504/IJBIDM.2017.10008075},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbidm/SathishkumarV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcac/OlakanmiD19,
  author       = {Oladayo Olufemi Olakanmi and
                  Adedamola Dada},
  title        = {An Efficient Privacy-preserving Approach for Secure Verifiable Outsourced
                  Computing on Untrusted Platforms},
  journal      = {Int. J. Cloud Appl. Comput.},
  volume       = {9},
  number       = {2},
  pages        = {79--98},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJCAC.2019040105},
  doi          = {10.4018/IJCAC.2019040105},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcac/OlakanmiD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/SwathiV19,
  author       = {V. Swathi and
                  M. P. Vani},
  title        = {Secure cloud computing using homomorphic construction},
  journal      = {Int. J. Cloud Comput.},
  volume       = {8},
  number       = {4},
  pages        = {354--370},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJCC.2019.104498},
  doi          = {10.1504/IJCC.2019.104498},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcc/SwathiV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/HussainQHH19,
  author       = {Mohammad Equebal Hussain and
                  Mohammed Qayyum and
                  Mohammad Rashid Hussain and
                  Rashid Hussain},
  title        = {Effective and Secure vWSN Applications in a Virtualized Cloud Computing
                  Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {11},
  number       = {2},
  year         = {2019},
  url          = {http://www.ijcnis.org/index.php/ijcnis/article/view/3920},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcnis/HussainQHH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/IrshadCSUAG19,
  author       = {Azeem Irshad and
                  Shehzad Ashraf Chaudhry and
                  Muhammad Shafiq and
                  Muhammad Usman and
                  Muhammad Asif and
                  Anwar Ghani},
  title        = {A provable and secure mobile user authentication scheme for mobile
                  cloud computing services},
  journal      = {Int. J. Commun. Syst.},
  volume       = {32},
  number       = {14},
  year         = {2019},
  url          = {https://doi.org/10.1002/dac.3980},
  doi          = {10.1002/DAC.3980},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/IrshadCSUAG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdcf/ShahBK19,
  author       = {Junaid Latief Shah and
                  Heena Farooq Bhat and
                  Asif Iqbal Khan},
  title        = {CloudIoT: Towards Seamless and Secure Integration of Cloud Computing
                  With Internet of Things},
  journal      = {Int. J. Digit. Crime Forensics},
  volume       = {11},
  number       = {3},
  pages        = {1--22},
  year         = {2019},
  url          = {https://doi.org/10.4018/IJDCF.2019070101},
  doi          = {10.4018/IJDCF.2019070101},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdcf/ShahBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/SinghRMKC19,
  author       = {Saurabh Singh and
                  In{-}Ho Ra and
                  Weizhi Meng and
                  Maninder Kaur and
                  Gi Hwan Cho},
  title        = {SH-BlockCC: {A} secure and efficient Internet of things smart home
                  architecture based on cloud computing and blockchain technology},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {15},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1177/1550147719844159},
  doi          = {10.1177/1550147719844159},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/SinghRMKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/HuoJTT19,
  author       = {Huixia Huo and
                  Tao Jiang and
                  Shichong Tan and
                  Xiaoling Tao},
  title        = {Efficient public integrity auditing with secure deduplication in cloud
                  computing},
  journal      = {Int. J. Embed. Syst.},
  volume       = {11},
  number       = {6},
  pages        = {764--777},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJES.2019.103995},
  doi          = {10.1504/IJES.2019.103995},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/HuoJTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/KangYHWMXZ19,
  author       = {Jiawen Kang and
                  Rong Yu and
                  Xumin Huang and
                  Maoqiang Wu and
                  Sabita Maharjan and
                  Shengli Xie and
                  Yan Zhang},
  title        = {Blockchain for Secure and Efficient Data Sharing in Vehicular Edge
                  Computing and Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4660--4670},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2875542},
  doi          = {10.1109/JIOT.2018.2875542},
  timestamp    = {Fri, 28 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/KangYHWMXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuYDA19,
  author       = {Dan Liu and
                  Zheng Yan and
                  Wenxiu Ding and
                  Mohammed Atiquzzaman},
  title        = {A Survey on Secure Data Analytics in Edge Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4946--4967},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2897619},
  doi          = {10.1109/JIOT.2019.2897619},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuYDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangZLBJ19,
  author       = {Tian Wang and
                  Guangxue Zhang and
                  Anfeng Liu and
                  Md. Zakirul Alam Bhuiyan and
                  Qun Jin},
  title        = {A Secure IoT Service Architecture With an Efficient Balance Dynamics
                  Based on Cloud and Edge Computing},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4831--4843},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2870288},
  doi          = {10.1109/JIOT.2018.2870288},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WangZLBJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuSZLDZ19,
  author       = {Qichao Xu and
                  Zhou Su and
                  Qinghua Zheng and
                  Minnan Luo and
                  Bo Dong and
                  Kuan Zhang},
  title        = {Game Theoretical Secure Caching Scheme in Multihoming Edge Computing-Enabled
                  Heterogeneous Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {3},
  pages        = {4536--4546},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2018.2876417},
  doi          = {10.1109/JIOT.2018.2876417},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/XuSZLDZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HossainM19,
  author       = {M. Shamim Hossain and
                  Ghulam Muhammad},
  title        = {Emotion recognition using secure edge and cloud computing},
  journal      = {Inf. Sci.},
  volume       = {504},
  pages        = {589--601},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.07.040},
  doi          = {10.1016/J.INS.2019.07.040},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HossainM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/DurresiSDBU19,
  author       = {Mimoza Durresi and
                  Anisa Subashi and
                  Arjan Durresi and
                  Leonard Barolli and
                  Kazunori Uchida},
  title        = {Secure communication architecture for internet of things using smartphones
                  and multi-access edge computing in environment monitoring},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {10},
  number       = {4},
  pages        = {1631--1640},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12652-018-0759-6},
  doi          = {10.1007/S12652-018-0759-6},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/DurresiSDBU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/TianTYJM19,
  author       = {Shuicheng Tian and
                  Kai Tang and
                  Pengfei Yang and
                  Aifang Jia and
                  Hailey Melvin},
  title        = {Secure cloud computing model for communication network management},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {37},
  number       = {1},
  pages        = {27--34},
  year         = {2019},
  url          = {https://doi.org/10.3233/JIFS-179060},
  doi          = {10.3233/JIFS-179060},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jifs/TianTYJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/MahmoodHJ19,
  author       = {Ghassan Sabeeh Mahmood and
                  Dong Jun Huang and
                  Baidaa Abdulrahman Jaleel},
  title        = {A Secure Cloud Computing System by Using Encryption and Access Control
                  Model},
  journal      = {J. Inf. Process. Syst.},
  volume       = {15},
  number       = {3},
  pages        = {538--549},
  year         = {2019},
  url          = {http://www.jips-k.org/q.jips?cp=pp\&pn=669},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jips/MahmoodHJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/TianNCHLD19,
  author       = {Hui Tian and
                  Fulin Nan and
                  Chin{-}Chen Chang and
                  Yongfeng Huang and
                  Jing Lu and
                  Yongqian Du},
  title        = {Privacy-preserving public auditing for secure data storage in fog-to-cloud
                  computing},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {127},
  pages        = {59--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jnca.2018.12.004},
  doi          = {10.1016/J.JNCA.2018.12.004},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/TianNCHLD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsan/MuthannaAKGASK19,
  author       = {Ammar Muthanna and
                  Abdelhamied A. Ateya and
                  Abdukodir Khakimov and
                  Irina A. Gudkova and
                  Abdelrahman Abuarqoub and
                  Konstantin E. Samouylov and
                  Andrey Koucheryavy},
  title        = {Secure and Reliable IoT Networks Using Fog Computing with Software-Defined
                  Networking and Blockchain},
  journal      = {J. Sens. Actuator Networks},
  volume       = {8},
  number       = {1},
  pages        = {15},
  year         = {2019},
  url          = {https://doi.org/10.3390/jsan8010015},
  doi          = {10.3390/JSAN8010015},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsan/MuthannaAKGASK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/Wang0019,
  author       = {Tong Wang and
                  Wenping Ma and
                  Wei Luo},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{21306}}{\unicode{22359}}{\unicode{38142}}{\unicode{30340}}{\unicode{20449}}{\unicode{24687}}{\unicode{20849}}{\unicode{20139}}{\unicode{21450}}{\unicode{23433}}{\unicode{20840}}{\unicode{22810}}{\unicode{26041}}{\unicode{35745}}{\unicode{31639}}{\unicode{27169}}{\unicode{22411}}
                  (Information Sharing and Secure Multi-party Computing Model Based
                  on Blockchain)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {46},
  number       = {9},
  pages        = {162--168},
  year         = {2019},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2019.09.023},
  doi          = {10.11896/J.ISSN.1002-137X.2019.09.023},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/Wang0019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/XiongXCS19,
  author       = {Lizhi Xiong and
                  Zhihua Xia and
                  Xianyi Chen and
                  Hiuk Jae Shim},
  title        = {Secure multimedia distribution in cloud computing using re-encryption
                  and fingerprinting},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {21},
  pages        = {30297--30313},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6981-6},
  doi          = {10.1007/S11042-018-6981-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/XiongXCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenZMAW19,
  author       = {Yuanfang Chen and
                  Yan Zhang and
                  Sabita Maharjan and
                  Muhammad Alam and
                  Ting Wu},
  title        = {Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation
                  Systems},
  journal      = {{IEEE} Netw.},
  volume       = {33},
  number       = {4},
  pages        = {36--41},
  year         = {2019},
  url          = {https://doi.org/10.1109/MNET.2019.1800458},
  doi          = {10.1109/MNET.2019.1800458},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ChenZMAW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/LimbasiyaD19,
  author       = {Trupil Limbasiya and
                  Debasis Das},
  title        = {Secure message confirmation scheme based on batch verification in
                  vehicular cloud computing},
  journal      = {Phys. Commun.},
  volume       = {34},
  pages        = {310--320},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.phycom.2018.07.015},
  doi          = {10.1016/J.PHYCOM.2018.07.015},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/phycomm/LimbasiyaD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/KwonHKH19,
  author       = {Hyunsoo Kwon and
                  Changhee Hahn and
                  Kyungtae Kang and
                  Junbeom Hur},
  title        = {Secure deduplication with reliable and revocable key management in
                  fog computing},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {12},
  number       = {4},
  pages        = {850--864},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12083-018-0682-9},
  doi          = {10.1007/S12083-018-0682-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/KwonHKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/WangDC19,
  author       = {Haijiang Wang and
                  Xiaolei Dong and
                  Zhenfu Cao},
  title        = {Secure and efficient encrypted keyword search for multi-user setting
                  in cloud computing},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {12},
  number       = {1},
  pages        = {32--42},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12083-017-0622-0},
  doi          = {10.1007/S12083-017-0622-0},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/WangDC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/MorimaeK19,
  author       = {Tomoyuki Morimae and
                  Takeshi Koshiba},
  title        = {Impossibility Of Perfectly-Secure Ono-Round Delegated Quantum Computing
                  for classical client},
  journal      = {Quantum Inf. Comput.},
  volume       = {19},
  number       = {3{\&}4},
  pages        = {214--221},
  year         = {2019},
  url          = {https://doi.org/10.26421/QIC19.3-4-2},
  doi          = {10.26421/QIC19.3-4-2},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/MorimaeK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ria/SingamaneniN19,
  author       = {Kranthi Kumar Singamaneni and
                  Pasala Sanyasi Naidu},
  title        = {{IBLIND} Quantum Computing and {HASBE} for Secure Cloud Data Storage
                  and Accessing},
  journal      = {Rev. d'Intelligence Artif.},
  volume       = {33},
  number       = {1},
  pages        = {33--37},
  year         = {2019},
  url          = {https://doi.org/10.18280/ria.330106},
  doi          = {10.18280/RIA.330106},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ria/SingamaneniN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MunivelK19,
  author       = {E. Munivel and
                  Kannammal Annadurai},
  title        = {New Authentication Scheme to Secure against the Phishing Attack in
                  the Mobile Cloud Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5141395:1--5141395:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5141395},
  doi          = {10.1155/2019/5141395},
  timestamp    = {Mon, 08 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MunivelK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/YuPP19,
  author       = {SungJin Yu and
                  KiSung Park and
                  Youngho Park},
  title        = {A Secure Lightweight Three-Factor Authentication Scheme for IoT in
                  Cloud Computing Environment},
  journal      = {Sensors},
  volume       = {19},
  number       = {16},
  pages        = {3598},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19163598},
  doi          = {10.3390/S19163598},
  timestamp    = {Fri, 18 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/YuPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ElamathiJP19,
  author       = {N. Elamathi and
                  S. Jayashri and
                  R. Pitchai},
  title        = {Enhanced secure communication over inter-domain routing in heterogeneous
                  wireless networks based on analysis of {BGP} anomalies using soft
                  computing techniques},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {8},
  pages        = {2735--2746},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-019-03836-4},
  doi          = {10.1007/S00500-019-03836-4},
  timestamp    = {Fri, 29 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/ElamathiJP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/SujanaRPM19,
  author       = {J. Angela Jennifa Sujana and
                  T. Revathi and
                  T. S. Siva Priya and
                  K. Muneeswaran},
  title        = {Smart PSO-based secured scheduling approaches for scientific workflows
                  in cloud computing},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {5},
  pages        = {1745--1765},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-017-2897-8},
  doi          = {10.1007/S00500-017-2897-8},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/SujanaRPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WeiHLZ19,
  author       = {Jianghong Wei and
                  Xuexian Hu and
                  Wenfen Liu and
                  Qihui Zhang},
  title        = {Forward and backward secure fuzzy encryption for data sharing in cloud
                  computing},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {2},
  pages        = {497--506},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-017-2834-x},
  doi          = {10.1007/S00500-017-2834-X},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/WeiHLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/NarayananM19,
  author       = {Munisamy Eswara Narayanan and
                  Balasundaram Muthukumar},
  title        = {A highly secured and streamlined cloud collaborative editing scheme
                  along with an efficient user revocation in cloud computing},
  journal      = {Softw. Pract. Exp.},
  volume       = {49},
  number       = {12},
  pages        = {1728--1747},
  year         = {2019},
  url          = {https://doi.org/10.1002/spe.2754},
  doi          = {10.1002/SPE.2754},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/NarayananM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/KuangYZC19,
  author       = {Liwei Kuang and
                  Laurence T. Yang and
                  Qing Zhu and
                  Jinjun Chen},
  title        = {Secure Tensor Decomposition for Big Data Using Transparent Computing
                  Paradigm},
  journal      = {{IEEE} Trans. Computers},
  volume       = {68},
  number       = {4},
  pages        = {585--596},
  year         = {2019},
  url          = {https://doi.org/10.1109/TC.2018.2814046},
  doi          = {10.1109/TC.2018.2814046},
  timestamp    = {Fri, 12 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/KuangYZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/LiYZBLR19,
  author       = {Shancang Li and
                  Yong Yuan and
                  Jun Jason Zhang and
                  Bill Buchanan and
                  Erwu Liu and
                  Ramesh Ramadoss},
  title        = {Guest Editorial Special Issue on Blockchain-Based Secure and Trusted
                  Computing for IoT},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {6},
  number       = {6},
  pages        = {1369--1372},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSS.2019.2954939},
  doi          = {10.1109/TCSS.2019.2954939},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/LiYZBLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangL19,
  author       = {Heecheol Yang and
                  Jungwoo Lee},
  title        = {Secure Distributed Computing With Straggling Servers Using Polynomial
                  Codes},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {1},
  pages        = {141--150},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2846601},
  doi          = {10.1109/TIFS.2018.2846601},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YangL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/RoyDCKCR19,
  author       = {Sandip Roy and
                  Ashok Kumar Das and
                  Santanu Chatterjee and
                  Neeraj Kumar and
                  Samiran Chattopadhyay and
                  Joel J. P. C. Rodrigues},
  title        = {Provably Secure Fine-Grained Data Access Control Over Multiple Cloud
                  Servers in Mobile Cloud Computing Based Healthcare Applications},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {15},
  number       = {1},
  pages        = {457--468},
  year         = {2019},
  url          = {https://doi.org/10.1109/TII.2018.2824815},
  doi          = {10.1109/TII.2018.2824815},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/RoyDCKCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/BediSG19,
  author       = {Rajeev Kumar Bedi and
                  Jaswinder Singh and
                  Sunil Kumar Gupta},
  title        = {{MWC:} an efficient and secure multi-cloud storage approach to leverage
                  augmentation of multi-cloud storage services on mobile devices using
                  fog computing},
  journal      = {J. Supercomput.},
  volume       = {75},
  number       = {6},
  pages        = {3264--3287},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11227-018-2304-y},
  doi          = {10.1007/S11227-018-2304-Y},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/BediSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/XiongWLC19,
  author       = {Hu Xiong and
                  Yi Wang and
                  Wenchao Li and
                  Chien{-}Ming Chen},
  title        = {Flexible, Efficient, and Secure Access Delegation in Cloud Computing},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {10},
  number       = {1},
  pages        = {2:1--2:20},
  year         = {2019},
  url          = {https://doi.org/10.1145/3318212},
  doi          = {10.1145/3318212},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/XiongWLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/LiCG19,
  author       = {Bingcong Li and
                  Tianyi Chen and
                  Georgios B. Giannakis},
  title        = {Secure Mobile Edge Computing in IoT via Collaborative Online Learning},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {67},
  number       = {23},
  pages        = {5922--5935},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSP.2019.2949504},
  doi          = {10.1109/TSP.2019.2949504},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/LiCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/QiuKY19a,
  author       = {Meikang Qiu and
                  Sun{-}Yuan Kung and
                  Qing Yang},
  title        = {Editorial: {IEEE} Transactions on Sustainable Computing, Special Issue
                  on Secure Sustainable Green Smart Computing},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {142--144},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSUSC.2018.2882011},
  doi          = {10.1109/TSUSC.2018.2882011},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/QiuKY19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/BaiWRH19,
  author       = {Tong Bai and
                  Jingjing Wang and
                  Yong Ren and
                  Lajos Hanzo},
  title        = {Energy-Efficient Computation Offloading for Secure UAV-Edge-Computing
                  Systems},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {6},
  pages        = {6074--6087},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2019.2912227},
  doi          = {10.1109/TVT.2019.2912227},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/BaiWRH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/WuL19,
  author       = {Zhiqiang Wu and
                  Kenli Li},
  title        = {VBTree: forward secure conjunctive queries over encrypted data for
                  cloud computing},
  journal      = {{VLDB} J.},
  volume       = {28},
  number       = {1},
  pages        = {25--46},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00778-018-0517-6},
  doi          = {10.1007/S00778-018-0517-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vldb/WuL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/MoHCS19,
  author       = {Jiaqing Mo and
                  Zhongwang Hu and
                  Hang Chen and
                  Wei Shen},
  title        = {An Efficient and Provably Secure Anonymous User Authentication and
                  Key Agreement for Mobile Cloud Computing},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2019},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4520685},
  doi          = {10.1155/2019/4520685},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/MoHCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MofradALYCZ19,
  author       = {Saeid Mofrad and
                  Ishtiaq Ahmed and
                  Shiyong Lu and
                  Ping Yang and
                  Heming Cui and
                  Fengwei Zhang},
  editor       = {David M. Balenson},
  title        = {SecDATAVIEW: a secure big data workflow management system for heterogeneous
                  computing environments},
  booktitle    = {Proceedings of the 35th Annual Computer Security Applications Conference,
                  {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages        = {390--403},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359789.3359845},
  doi          = {10.1145/3359789.3359845},
  timestamp    = {Thu, 30 May 2024 10:08:27 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/MofradALYCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ShotaKSS19,
  author       = {Johjima Shota and
                  Kosuke Kaneko and
                  Subodh Sharma and
                  Kouichi Sakurai},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Fatos Xhafa and
                  Tomoya Enokido},
  title        = {Simulation of Secure Volunteer Computing by Using Blockchain},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 33rd International Conference on Advanced Information Networking
                  and Applications, {AINA} 2019, Matsue, Japan, March 27-29, 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {926},
  pages        = {883--894},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-15032-7\_74},
  doi          = {10.1007/978-3-030-15032-7\_74},
  timestamp    = {Mon, 04 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/ShotaKSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/AreekijsereeTS19,
  author       = {Katchaguy Areekijseree and
                  Yuzhe Richard Tang and
                  Sucheta Soundarajan},
  editor       = {Francesca Spezzano and
                  Wei Chen and
                  Xiaokui Xiao},
  title        = {Computing node clustering coefficients securely},
  booktitle    = {{ASONAM} '19: International Conference on Advances in Social Networks
                  Analysis and Mining, Vancouver, British Columbia, Canada, 27-30 August,
                  2019},
  pages        = {532--533},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3341161.3342946},
  doi          = {10.1145/3341161.3342946},
  timestamp    = {Sat, 09 Apr 2022 12:39:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asunam/AreekijsereeTS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cata/FaiziR19a,
  author       = {Salman Faizi and
                  Shawon Rahman},
  editor       = {Gordon Lee and
                  Ying Jin},
  title        = {Secured Cloud for Enterprise Computing},
  booktitle    = {Proceedings of 34th International Conference on Computers and Their
                  Applications, {CATA} 2019, Honolulu, Hawaii, USA, March 18-20, 2019},
  series       = {EPiC Series in Computing},
  volume       = {58},
  pages        = {356--367},
  publisher    = {EasyChair},
  year         = {2019},
  url          = {https://doi.org/10.29007/bbrx},
  doi          = {10.29007/BBRX},
  timestamp    = {Sun, 15 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cata/FaiziR19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/IslamCI19,
  author       = {S. M. Jahidul Islam and
                  Zulfiker Haider Chaudhury and
                  Saiful Islam},
  title        = {A Simple and Secured Cryptography System of Cloud Computing},
  booktitle    = {2019 {IEEE} Canadian Conference of Electrical and Computer Engineering,
                  {CCECE} 2019, Edmonton, AB, Canada, May 5-8, 2019},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCECE.2019.8861845},
  doi          = {10.1109/CCECE.2019.8861845},
  timestamp    = {Sun, 08 Aug 2021 01:40:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ccece/IslamCI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/KrislerPBT19,
  author       = {Brian Krisler and
                  Partha Pratim Pal and
                  Zech Bertilson and
                  Dan Thomsen},
  editor       = {Meikang Qiu},
  title        = {Secure Desktop Computing in the Cloud},
  booktitle    = {6th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2019 / 5th {IEEE} International Conference on Edge Computing
                  and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019},
  pages        = {107--112},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSCloud/EdgeCom.2019.00-10},
  doi          = {10.1109/CSCLOUD/EDGECOM.2019.00-10},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/KrislerPBT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/LiguoriSW19,
  author       = {Angelo Liguori and
                  Peter Schoo and
                  Marcel Winandy},
  editor       = {Meikang Qiu},
  title        = {Mind the Shift: Secure Migration of Containerized Processes in Edge
                  Computing},
  booktitle    = {6th {IEEE} International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2019 / 5th {IEEE} International Conference on Edge Computing
                  and Scalable Cloud, EdgeCom 2019, Paris, France, June 21-23, 2019},
  pages        = {204--209},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSCloud/EdgeCom.2019.00027},
  doi          = {10.1109/CSCLOUD/EDGECOM.2019.00027},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscloud/LiguoriSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/YoshikawaDWMNML19,
  author       = {Takashi Yoshikawa and
                  Susumu Date and
                  Yasuhiro Watashiba and
                  Yuki Matsui and
                  Kazunori Nozaki and
                  Shinya Murakami and
                  Chonho Lee and
                  Masami Hida and
                  Shinji Shimojo},
  editor       = {Meikang Qiu},
  title        = {Secure Staging System for Highly Confidential Data Built on Reconfigurable
                  Computing Platform},
  booktitle    = {2019 {IEEE} International Conference on Computational Science and
                  Engineering, {CSE} 2019, and {IEEE} International Conference on Embedded
                  and Ubiquitous Computing, {EUC} 2019, New York, NY, USA, August 1-3,
                  2019},
  pages        = {308--313},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CSE/EUC.2019.00066},
  doi          = {10.1109/CSE/EUC.2019.00066},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/YoshikawaDWMNML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/CiSLDZ19,
  author       = {Shang Ci and
                  Liping Sun and
                  Xiaoqing Liu and
                  Tingli Du and
                  Xiaoyao Zheng},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {A Secure Density Peaks Clustering Algorithm on Cloud Computing},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11982},
  pages        = {533--541},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37337-5\_43},
  doi          = {10.1007/978-3-030-37337-5\_43},
  timestamp    = {Wed, 08 Jan 2020 15:12:41 +0100},
  biburl       = {https://dblp.org/rec/conf/css/CiSLDZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/LiL19,
  author       = {Ping Li and
                  Jin Li},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {Secure and Dynamic Outsourcing Computation of Machine Learning in
                  Cloud Computing},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11983},
  pages        = {285--292},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37352-8\_25},
  doi          = {10.1007/978-3-030-37352-8\_25},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/LiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WangQY19,
  author       = {Fan Wang and
                  Zheng Qin and
                  Hui Yin},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud
                  Computing},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11983},
  pages        = {432--447},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37352-8\_38},
  doi          = {10.1007/978-3-030-37352-8\_38},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/WangQY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybhyg/ShakerkhanKKDBS19,
  author       = {K. Shakerkhan and
                  M. Kuttykadamov and
                  S. Koibagarov and
                  R. Duiskenova and
                  Zh. Baibussinova and
                  V. Sydorenko},
  editor       = {Sergiy Gnatyuk and
                  Solomiia Fedushko and
                  Zhengbing Hu and
                  Roman Odarchenko and
                  Yuriy Syerov and
                  Andriy Peleshchyshyn and
                  Igor Korobiichuk},
  title        = {Method for Choosing Secure Cloud Computing on the Platform of PaaS
                  for the State Agencies Services},
  booktitle    = {Proceedings of the International Workshop on Cyber Hygiene (CybHyg-2019)
                  co-located with 1st International Conference on Cyber Hygiene and
                  Conflict Management in Global Information Networks (CyberConf 2019),
                  Kyiv, Ukraine, November 30, 2019},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2654},
  pages        = {810--826},
  publisher    = {CEUR-WS.org},
  year         = {2019},
  url          = {https://ceur-ws.org/Vol-2654/paper63.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybhyg/ShakerkhanKKDBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/KrishnanSDS19,
  author       = {Archanaa S. Krishnan and
                  Charles Suslowicz and
                  Daniel Dinu and
                  Patrick Schaumont},
  editor       = {J{\"{u}}rgen Teich and
                  Franco Fummi},
  title        = {Secure Intermittent Computing Protocol: Protecting State Across Power
                  Loss},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2019, Florence, Italy, March 25-29, 2019},
  pages        = {734--739},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/DATE.2019.8714997},
  doi          = {10.23919/DATE.2019.8714997},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/KrishnanSDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euspn/GahiA19,
  author       = {Youssef Gahi and
                  Imane El Alaoui},
  editor       = {Elhadi M. Shakshuki and
                  Ansar{-}Ul{-}Haque Yasar and
                  Haroon Malik},
  title        = {A Secure Multi-User Database-as-a-Service Approach for Cloud Computing
                  Privacy},
  booktitle    = {The 10th International Conference on Emerging Ubiquitous Systems and
                  Pervasive Networks {(EUSPN} 2019) / The 9th International Conference
                  on Current and Future Trends of Information and Communication Technologies
                  in Healthcare {(ICTH-2019)} / Affiliated Workshops, Coimbra, Portugal,
                  November 4-7, 2019},
  series       = {Procedia Computer Science},
  volume       = {160},
  pages        = {811--818},
  publisher    = {Elsevier},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.procs.2019.11.006},
  doi          = {10.1016/J.PROCS.2019.11.006},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euspn/GahiA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KoumidisKEP19,
  author       = {Konstandinos Koumidis and
                  Panayiotis Kolios and
                  George Ellinas and
                  Christos G. Panayiotou},
  title        = {Secure Event Logging Using a Blockchain of Heterogeneous Computing
                  Resources},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013452},
  doi          = {10.1109/GLOBECOM38437.2019.9013452},
  timestamp    = {Wed, 04 Mar 2020 10:00:45 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/KoumidisKEP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YangW0CWLC19,
  author       = {Hui Yang and
                  Jun{-}Bo Wang and
                  Ming Cheng and
                  Chuanwen Chang and
                  Jin{-}Yuan Wang and
                  Min Lin and
                  Ming Chen},
  title        = {Secure Resource Allocation in Mobile Edge Computing Systems},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9014031},
  doi          = {10.1109/GLOBECOM38437.2019.9014031},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YangW0CWLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/glvlsi/KinsyB19,
  author       = {Michel A. Kinsy and
                  Novak Boskov},
  editor       = {Houman Homayoun and
                  Baris Taskin and
                  Tinoosh Mohsenin and
                  Weisheng Zhao},
  title        = {Secure Computing Systems Design Through Formal Micro-Contracts},
  booktitle    = {Proceedings of the 2019 on Great Lakes Symposium on VLSI, {GLSVLSI}
                  2019, Tysons Corner, VA, USA, May 9-11, 2019},
  pages        = {537--542},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3299874.3319447},
  doi          = {10.1145/3299874.3319447},
  timestamp    = {Wed, 10 Mar 2021 14:55:38 +0100},
  biburl       = {https://dblp.org/rec/conf/glvlsi/KinsyB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/AhmadZGS19,
  author       = {Sahan Ahmad and
                  S. M. Zobaed and
                  Raju Gottumukkala and
                  Mohsen Amini Salehi},
  editor       = {Zheng Xiao and
                  Laurence T. Yang and
                  Pavan Balaji and
                  Tao Li and
                  Keqin Li and
                  Albert Y. Zomaya},
  title        = {Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted
                  Big Data},
  booktitle    = {21st {IEEE} International Conference on High Performance Computing
                  and Communications; 17th {IEEE} International Conference on Smart
                  City; 5th {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019},
  pages        = {662--669},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00100},
  doi          = {10.1109/HPCC/SMARTCITY/DSS.2019.00100},
  timestamp    = {Fri, 19 Nov 2021 12:28:04 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/AhmadZGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/KongWMXYC19,
  author       = {Tong Kong and
                  Liming Wang and
                  Duohe Ma and
                  Zhen Xu and
                  Qian Yang and
                  Kai Chen},
  editor       = {Zheng Xiao and
                  Laurence T. Yang and
                  Pavan Balaji and
                  Tao Li and
                  Keqin Li and
                  Albert Y. Zomaya},
  title        = {A Secure Container Deployment Strategy by Genetic Algorithm to Defend
                  against Co-Resident Attacks in Cloud Computing},
  booktitle    = {21st {IEEE} International Conference on High Performance Computing
                  and Communications; 17th {IEEE} International Conference on Smart
                  City; 5th {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2019, Zhangjiajie, China, August 10-12, 2019},
  pages        = {1825--1832},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/HPCC/SmartCity/DSS.2019.00251},
  doi          = {10.1109/HPCC/SMARTCITY/DSS.2019.00251},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/KongWMXYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ZhangQYZ19,
  author       = {Fuyou Zhang and
                  Saiyu Qi and
                  Haoran Yuan and
                  Meng Zhang},
  editor       = {Sheng Wen and
                  Albert Y. Zomaya and
                  Laurence T. Yang},
  title        = {Secure Data Deduplication with Resistance to Side-Channel Attacks
                  via Fog Computing},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 19th International
                  Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11,
                  2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11945},
  pages        = {440--455},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38961-1\_39},
  doi          = {10.1007/978-3-030-38961-1\_39},
  timestamp    = {Tue, 28 Jan 2020 11:28:52 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ZhangQYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icai2/OlowuYMF19,
  author       = {Modebola Olowu and
                  Chika Yinka{-}Banjo and
                  Sanjay Misra and
                  Hector Florez},
  editor       = {Hector Florez and
                  Marcelo Le{\'{o}}n and
                  Jos{\'{e}} Mar{\'{\i}}a D{\'{\i}}az Nafr{\'{\i}}a and
                  Simone Belli},
  title        = {A Secured Private-Cloud Computing System},
  booktitle    = {Applied Informatics - Second International Conference, {ICAI} 2019,
                  Madrid, Spain, November 7-9, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1051},
  pages        = {373--384},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32475-9\_27},
  doi          = {10.1007/978-3-030-32475-9\_27},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icai2/OlowuYMF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/0005ZLDWL19,
  author       = {Wei Wu and
                  Fuhui Zhou and
                  Pei Li and
                  Ping Deng and
                  Baoyun Wang and
                  Victor C. M. Leung},
  title        = {Energy-Efficient Secure NOMA-Enabled Mobile Edge Computing Networks},
  booktitle    = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
                  Shanghai, China, May 20-24, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICC.2019.8761823},
  doi          = {10.1109/ICC.2019.8761823},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/0005ZLDWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/CaiCTWY19,
  author       = {Yi Cai and
                  Xiaoming Chen and
                  Lu Tian and
                  Yu Wang and
                  Huazhong Yang},
  editor       = {David Z. Pan},
  title        = {Enabling Secure in-Memory Neural Network Computing by Sparse Fast
                  Gradient Encryption},
  booktitle    = {Proceedings of the International Conference on Computer-Aided Design,
                  {ICCAD} 2019, Westminster, CO, USA, November 4-7, 2019},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCAD45719.2019.8942041},
  doi          = {10.1109/ICCAD45719.2019.8942041},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccad/CaiCTWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/HalabiBA19,
  author       = {Talal Halabi and
                  Martine Bella{\"{\i}}che and
                  Adel Abusitta},
  title        = {Toward Secure Resource Allocation in Mobile Cloud Computing: {A} Matching
                  Game},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019},
  pages        = {370--374},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCNC.2019.8685509},
  doi          = {10.1109/ICCNC.2019.8685509},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/HalabiBA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icct/WangWLW19,
  author       = {Xinxin Wang and
                  Wei Wu and
                  Bin Lyu and
                  Hong Wang},
  title        = {Delay Minimization for Secure {NOMA} Mobile-Edge Computing},
  booktitle    = {19th {IEEE} International Conference on Communication Technology,
                  {ICCT} 2019, Xi'an, China, October 16-19, 2019},
  pages        = {1529--1534},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCT46805.2019.8947270},
  doi          = {10.1109/ICCT46805.2019.8947270},
  timestamp    = {Sat, 04 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icct/WangWLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/BulutY19,
  author       = {Eyuphan Bulut and
                  Murat Yuksel},
  title        = {Integrating In-Network Computing for Secure and Efficient Cascaded
                  Delivery in DTNs},
  booktitle    = {First {IEEE} International Workshop on Network Meets Intelligent Computations,
                  NMIC@ICDCS 2019, Dallas, TX, USA, July 7-9, 2019},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NMIC.2019.00009},
  doi          = {10.1109/NMIC.2019.00009},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/BulutY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/Cao00LZJZ19,
  author       = {Chunming Cao and
                  Jin Wang and
                  Jianping Wang and
                  Kejie Lu and
                  Jingya Zhou and
                  Admela Jukan and
                  Wei Zhao},
  title        = {Optimal Task Allocation and Coding Design for Secure Coded Edge Computing},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1083--1093},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00111},
  doi          = {10.1109/ICDCS.2019.00111},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcs/Cao00LZJZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/MorPALK19,
  author       = {Nitesh Mor and
                  Richard Pratt and
                  Eric Allman and
                  Kenneth Lutz and
                  John Kubiatowicz},
  title        = {Global Data Plane: {A} Federated Vision for Secure Data in Edge Computing},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1652--1663},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00164},
  doi          = {10.1109/ICDCS.2019.00164},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/MorPALK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/HarissSC19,
  author       = {Khalil Hariss and
                  Abed Ellatif Samhat and
                  Maroun Chamoun},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {An Efficient {FHE} Scheme to Secure Cloud Computing},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {341--349},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007788803410349},
  doi          = {10.5220/0007788803410349},
  timestamp    = {Tue, 06 Jun 2023 14:58:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/HarissSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/ChenW19,
  author       = {Ching{-}Chiang Chen and
                  Chia{-}Nan Wang},
  editor       = {Wanqing Wu and
                  Lipo Wang and
                  Chunlei Ji and
                  Niansheng Chen and
                  Qiang Sun and
                  Xiaoyong Song and
                  Xin Wang},
  title        = {Constructing of vulnerability prevention secure model for the cloud
                  computing},
  booktitle    = {6th International Conference on Systems and Informatics, {ICSAI} 2019,
                  Shanghai, China, November 2-4, 2019},
  pages        = {694--698},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICSAI48974.2019.9010146},
  doi          = {10.1109/ICSAI48974.2019.9010146},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsai/ChenW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iecon/MaLW19,
  author       = {Renjie Ma and
                  Jianxing Liu and
                  Ligang Wu},
  title        = {Privacy-Enabled Secure Control of Fog Computing Aided Cyber-Physical
                  Systems},
  booktitle    = {{IECON} 2019 - 45th Annual Conference of the {IEEE} Industrial Electronics
                  Society, Lisbon, Portugal, October 14-17, 2019},
  pages        = {509--514},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IECON.2019.8927690},
  doi          = {10.1109/IECON.2019.8927690},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iecon/MaLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iske/WangZXS19,
  author       = {DanChen Wang and
                  Xiaosong Zhang and
                  Yang Xu and
                  Haiquan Song},
  editor       = {Li Zou and
                  Lingling Fang and
                  Bo Fu and
                  Panpan Niu},
  title        = {A Secure Multi-Party Computing System Based on {SGX} Technology for
                  Trusted Data Circulation},
  booktitle    = {14th {IEEE} International Conference on Intelligent Systems and Knowledge
                  Engineering, {ISKE} 2019, Dalian, China, November 14-16, 2019},
  pages        = {90--95},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISKE47853.2019.9170307},
  doi          = {10.1109/ISKE47853.2019.9170307},
  timestamp    = {Wed, 26 Aug 2020 15:39:06 +0200},
  biburl       = {https://dblp.org/rec/conf/iske/WangZXS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/Zhou0LWLZ19,
  author       = {Wei Zhou and
                  Jin Wang and
                  Lingzhi Li and
                  Jianping Wang and
                  Kejie Lu and
                  Xiaobo Zhou},
  title        = {An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector},
  booktitle    = {2019 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking,
                  ISPA/BDCloud/SocialCom/SustainCom 2019, Xiamen, China, December 16-18,
                  2019},
  pages        = {100--107},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00025},
  doi          = {10.1109/ISPA-BDCLOUD-SUSTAINCOM-SOCIALCOM48970.2019.00025},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/Zhou0LWLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kivs/ZielinskiSZSRZM19,
  author       = {Erich Zielinski and
                  Julius Schulz{-}Zander and
                  Marc Zimmermann and
                  Christian Schellenberger and
                  Alejandro Ram{\'{\i}}rez and
                  Florian Zeiger and
                  Mathias Mormul and
                  Felicitas Hetzelt and
                  Felix Beierle and
                  Harald Klaus and
                  Hanspeter Ruckstuhl and
                  Alexander Artemenko},
  title        = {Secure Real-time Communication and Computing Infrastructure for Industry
                  4.0 - Challenges and Opportunities},
  booktitle    = {2019 International Conference on Networked Systems, NetSys 2019, Munich,
                  Germany, March 18-21, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NetSys.2019.8854499},
  doi          = {10.1109/NETSYS.2019.8854499},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kivs/ZielinskiSZSRZM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ladc/BritoBBSC19,
  author       = {Andrey Brito and
                  Francisco V. Brasileiro and
                  Ignacio Blanquer and
                  Altigran S. da Silva and
                  Andr{\'{e}} Carvalho},
  title        = {{ATMOSPHERE:} Adaptive, Trustworthy, Manageable, Orchestrated, Secure,
                  Privacy-Assuring, Hybrid Ecosystem for Resilient Cloud Computing},
  booktitle    = {9th Latin-American Symposium on Dependable Computing, {LADC} 2019,
                  Natal, Brazil, November 19-21, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/LADC48089.2019.8995718},
  doi          = {10.1109/LADC48089.2019.8995718},
  timestamp    = {Fri, 04 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ladc/BritoBBSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ZhangWZ19,
  author       = {Lili Zhang and
                  Wenjie Wang and
                  Yuqing Zhang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Semantically Secure and Verifiable Multi-keyword Search in Cloud Computing},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {203--223},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_15},
  doi          = {10.1007/978-3-030-30619-9\_15},
  timestamp    = {Tue, 27 Sep 2022 14:19:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/ZhangWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsoft/Koutroumpouchos19,
  author       = {Nikos Koutroumpouchos and
                  Christoforos Ntantogian and
                  Sofia{-}Anna Menesidou and
                  Kaitai Liang and
                  Panagiotis Gouvas and
                  Christos Xenakis and
                  Thanassis Giannetsos},
  editor       = {Christian Jacquenet and
                  Filip De Turck and
                  Prosper Chemouil and
                  Flavio Esposito and
                  Olivier Festor and
                  Walter Cerroni and
                  Stefano Secci},
  title        = {Secure Edge Computing with Lightweight Control-Flow Property-based
                  Attestation},
  booktitle    = {5th {IEEE} Conference on Network Softwarization, NetSoft 2019, Paris,
                  France, June 24-28, 2019},
  pages        = {84--92},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/NETSOFT.2019.8806658},
  doi          = {10.1109/NETSOFT.2019.8806658},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/netsoft/Koutroumpouchos19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/ParterY19,
  author       = {Merav Parter and
                  Eylon Yogev},
  editor       = {Peter Robinson and
                  Faith Ellen},
  title        = {Secure Distributed Computing Made (Nearly) Optimal},
  booktitle    = {Proceedings of the 2019 {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2019, Toronto, ON, Canada, July 29 - August 2, 2019},
  pages        = {107--116},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3293611.3331620},
  doi          = {10.1145/3293611.3331620},
  timestamp    = {Fri, 19 Jul 2019 08:02:49 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/ParterY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Li0N19,
  author       = {Xiang Li and
                  Hui Tian and
                  Jianting Ning},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {Secure Online/Offline Attribute-Based Encryption for IoT Users in
                  Cloud Computing},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {347--354},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_22},
  doi          = {10.1007/978-3-030-31919-9\_22},
  timestamp    = {Tue, 07 May 2024 20:13:43 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Li0N19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/0006ZL19,
  author       = {Meng Li and
                  Liehuang Zhu and
                  Xiaodong Lin},
  editor       = {Songqing Chen and
                  Kim{-}Kwang Raymond Choo and
                  Xinwen Fu and
                  Wenjing Lou and
                  Aziz Mohaisen},
  title        = {CoRide: {A} Privacy-Preserving Collaborative-Ride Hailing Service
                  Using Blockchain-Assisted Vehicular Fog Computing},
  booktitle    = {Security and Privacy in Communication Networks - 15th {EAI} International
                  Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {305},
  pages        = {408--422},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37231-6\_24},
  doi          = {10.1007/978-3-030-37231-6\_24},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/0006ZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socc/HuangQ19,
  author       = {Kejie Huang and
                  Chuyun Qin},
  title        = {eNVM based In-memory Computing for Intelligent and Secure Computing
                  Systems},
  booktitle    = {32nd {IEEE} International System-on-Chip Conference, {SOCC} 2019,
                  Singapore, September 3-6, 2019},
  pages        = {348--353},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SOCC46988.2019.1570557582},
  doi          = {10.1109/SOCC46988.2019.1570557582},
  timestamp    = {Tue, 19 May 2020 13:56:11 +0200},
  biburl       = {https://dblp.org/rec/conf/socc/HuangQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soups/QinLJFAGRV19,
  author       = {Lucy Qin and
                  Andrei Lapets and
                  Frederick Jansen and
                  Peter Flockhart and
                  Kinan Dak Albab and
                  Ira Globus{-}Harris and
                  Shannon Roberts and
                  Mayank Varia},
  editor       = {Heather Richter Lipford},
  title        = {From Usability to Secure Computing and Back Again},
  booktitle    = {Fifteenth Symposium on Usable Privacy and Security, {SOUPS} 2019,
                  Santa Clara, CA, USA, August 11-13, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/soups2019/presentation/qin},
  timestamp    = {Mon, 01 Feb 2021 08:41:56 +0100},
  biburl       = {https://dblp.org/rec/conf/soups/QinLJFAGRV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sqamia/BargmannT19,
  author       = {Christian Bargmann and
                  Marina Tropmann{-}Frick},
  editor       = {Zoran Budimac and
                  Bojana Koteska},
  title        = {A Survey On Secure Container Isolation Approaches for Multi-Tenant
                  Container Workloads and Serverless Computing},
  booktitle    = {Proceedings of the Eighth Workshop on Software Quality Analysis, Monitoring,
                  Improvement, and Applications, {SQAMIA} 2019, Ohrid, North Macedonia,
                  September 22-25, 2019},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {2508},
  publisher    = {CEUR-WS.org},
  year         = {2019},
  url          = {https://ceur-ws.org/Vol-2508/paper-bar.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:29 +0100},
  biburl       = {https://dblp.org/rec/conf/sqamia/BargmannT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ChkirbeneEH19,
  author       = {Zina Chkirbene and
                  Aiman Erbad and
                  Ridha Hamila},
  title        = {A Combined Decision for Secure Cloud Computing Based on Machine Learning
                  and Past Information},
  booktitle    = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2019, Marrakesh, Morocco, April 15-18, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/WCNC.2019.8885566},
  doi          = {10.1109/WCNC.2019.8885566},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/ChkirbeneEH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2019,
  title        = {2019 {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
                  Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud
                  and Big Data Computing, Intl Conf on Cyber Science and Technology
                  Congress, DASC/PiCom/CBDCom/CyberSciTech 2019, Fukuoka, Japan, August
                  5-8, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8877880/proceeding},
  isbn         = {978-1-7281-3024-8},
  timestamp    = {Sun, 10 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/desec/2019,
  title        = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8930388/proceeding},
  isbn         = {978-1-7281-2319-6},
  timestamp    = {Mon, 16 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/bdt/MishraSS19,
  author       = {Sambit Kumar Mishra and
                  Sampa Sahoo and
                  Bibhudatta Sahoo},
  editor       = {Sherif Sakr and
                  Albert Y. Zomaya},
  title        = {Secure Big Data Computing in Cloud: An Overview},
  booktitle    = {Encyclopedia of Big Data Technologies},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-319-63962-8\_233-1},
  doi          = {10.1007/978-3-319-63962-8\_233-1},
  timestamp    = {Thu, 22 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/bdt/MishraSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-06319,
  author       = {Siming Wang and
                  Xumin Huang and
                  Rong Yu and
                  Yan Zhang and
                  Ekram Hossain},
  title        = {Permissioned Blockchain for Efficient and Secure Resource Sharing
                  in Vehicular Edge Computing},
  journal      = {CoRR},
  volume       = {abs/1906.06319},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.06319},
  eprinttype    = {arXiv},
  eprint       = {1906.06319},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-06319.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10893,
  author       = {Yang Zhao and
                  Jun Zhao and
                  Linshan Jiang and
                  Rui Tan and
                  Dusit Niyato},
  title        = {Mobile Edge Computing, Blockchain and Reputation-based Crowdsourcing
                  IoT Federated Learning: {A} Secure, Decentralized and Privacy-preserving
                  System},
  journal      = {CoRR},
  volume       = {abs/1906.10893},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10893},
  eprinttype    = {arXiv},
  eprint       = {1906.10893},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-03668,
  author       = {Sahan Ahmad and
                  S. M. Zobaed and
                  Raju Gottumukkala and
                  Mohsen Amini Salehi},
  title        = {Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted
                  Big Data},
  journal      = {CoRR},
  volume       = {abs/1908.03668},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.03668},
  eprinttype    = {arXiv},
  eprint       = {1908.03668},
  timestamp    = {Mon, 19 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-03668.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-09886,
  author       = {Wei Wu and
                  Fuhui Zhou and
                  Rose Qingyang Hu and
                  Baoyun Wang},
  title        = {Energy-Efficient Resource Allocation for Secure NOMA-Enabled Mobile
                  Edge Computing Networks},
  journal      = {CoRR},
  volume       = {abs/1910.09886},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.09886},
  eprinttype    = {arXiv},
  eprint       = {1910.09886},
  timestamp    = {Thu, 23 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-09886.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-05994,
  author       = {Suthee Ruangwises and
                  Toshiya Itoh},
  title        = {Securely Computing the n-Variable Equality Function with 2n Cards},
  journal      = {CoRR},
  volume       = {abs/1911.05994},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.05994},
  eprinttype    = {arXiv},
  eprint       = {1911.05994},
  timestamp    = {Mon, 02 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-05994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-01563,
  author       = {Behzad Salami and
                  Konstantinos Parasyris and
                  Adri{\'{a}}n Cristal and
                  Osman S. Unsal and
                  Xavier Martorell and
                  Paul Carpenter and
                  Ra{\'{u}}l de la Cruz and
                  Leonardo Bautista{-}Gomez and
                  Daniel A. Jim{\'{e}}nez and
                  Carlos {\'{A}}lvarez and
                  S. Nabavi and
                  Sergi Madonar and
                  Miquel Peric{\`{a}}s and
                  Pedro Trancoso and
                  Mustafa Abduljabbar and
                  Jing Chen and
                  Pirah Noor Soomro and
                  Madhavan Manivannan and
                  Micha vor dem Berge and
                  Stefan Krupop and
                  Frank Klawonn and
                  Al Mekhlafi and
                  Sigrun May and
                  Tobias Becker and
                  Georgi Gaydadjiev and
                  Daniel {\"{O}}dman and
                  Hans Salomonsson and
                  Devdatt P. Dubhashi and
                  Oron Port and
                  Yoav Etsion and
                  Do Le Quoc and
                  Christof Fetzer and
                  Martin Kaiser and
                  Nils Kucza and
                  Jens Hagemeyer and
                  Ren{\'{e}} Griessl and
                  Lennart Tigges and
                  Kevin Mika and
                  A. H{\"{u}}ffmeier and
                  Th. Jungeblu and
                  Marcelo Pasin and
                  Valerio Schiavoni and
                  Isabelly Rocha and
                  Christian G{\"{o}}ttel and
                  Pascal Felber},
  title        = {LEGaTO: Low-Energy, Secure, and Resilient Toolset for Heterogeneous
                  Computing},
  journal      = {CoRR},
  volume       = {abs/1912.01563},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.01563},
  eprinttype    = {arXiv},
  eprint       = {1912.01563},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-01563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGKP19,
  author       = {Shweta Agrawal and
                  Rachit Garg and
                  Nishant Kumar and
                  Manoj Prabhakaran},
  title        = {A Practical Model for Collaborative Databases: Securely Mixing, Searching
                  and Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1262},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1262},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IonKNPRSSSY19,
  author       = {Mihaela Ion and
                  Ben Kreuter and
                  Ahmet Erhan Nergiz and
                  Sarvar Patel and
                  Mariana Raykova and
                  Shobhit Saxena and
                  Karn Seth and
                  David Shanahan and
                  Moti Yung},
  title        = {On Deploying Secure Computing Commercially: Private Intersection-Sum
                  Protocols and their Business Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/723},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IonKNPRSSSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QinLJFAGRV19,
  author       = {Lucy Qin and
                  Andrei Lapets and
                  Frederick Jansen and
                  Peter Flockhart and
                  Kinan Dak Albab and
                  Ira Globus{-}Harris and
                  Shannon Roberts and
                  Mayank Varia},
  title        = {From Usability to Secure Computing and Back Again},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/734},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QinLJFAGRV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Veugen19,
  author       = {Thijs Veugen},
  title        = {Efficient coding for secure computing with additively-homomorphic
                  encrypted data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Veugen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ch/Huang18,
  author       = {Zhicong Huang},
  title        = {On Secure Cloud Computing for Genomic Data: From Storage to Analysis},
  school       = {EPFL, Switzerland},
  year         = {2018},
  url          = {https://doi.org/10.5075/epfl-thesis-8367},
  doi          = {10.5075/EPFL-THESIS-8367},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ch/Huang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Kopal18,
  author       = {Nils Kopal},
  title        = {Secure Volunteer Computing for Distributed Cryptanalysis},
  school       = {University of Kassel, Germany},
  year         = {2018},
  url          = {http://www.upress.uni-kassel.de/katalog/abstract.php?978-3-7376-0426-0},
  urn          = {urn:nbn:de:0002-404276},
  isbn         = {978-3-7376-0426-0},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Kopal18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYHY18,
  author       = {Qinlong Huang and
                  Wei Yue and
                  Yue He and
                  Yixian Yang},
  title        = {Secure Identity-Based Data Sharing and Profile Matching for Mobile
                  Healthcare Social Networks in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {36584--36594},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2852784},
  doi          = {10.1109/ACCESS.2018.2852784},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYHY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYPS18,
  author       = {Xumin Huang and
                  Rong Yu and
                  Miao Pan and
                  Lei Shu},
  title        = {Secure Roadside Unit Hotspot Against Eavesdropping Based Traffic Analysis
                  in Edge Computing Based Internet of Vehicles},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {62371--62383},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2868002},
  doi          = {10.1109/ACCESS.2018.2868002},
  timestamp    = {Mon, 28 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HuangYPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYW18,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Licheng Wang},
  title        = {Correction to "Secure Data Access Control With Ciphertext Update and
                  Computation Outsourcing in Fog Computing for Internet of Things"},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {17245},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2823178},
  doi          = {10.1109/ACCESS.2018.2823178},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiWLGG18,
  author       = {Gaolei Li and
                  Jun Wu and
                  Jianhua Li and
                  Zhitao Guan and
                  Longhua Guo},
  title        = {Fog Computing-Enabled Secure Demand Response for Internet of Energy
                  Against Collusion Attacks Using Consensus and {ACE}},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {11278--11288},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2799543},
  doi          = {10.1109/ACCESS.2018.2799543},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LiWLGG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LuoM18a,
  author       = {Wei Luo and
                  Wenping Ma},
  title        = {Efficient and Secure Access Control Scheme in the Standard Model for
                  Vehicular Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {40420--40428},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2858233},
  doi          = {10.1109/ACCESS.2018.2858233},
  timestamp    = {Thu, 05 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LuoM18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RahmanHLHRAG18,
  author       = {Mohamed Abdur Rahman and
                  M. Shamim Hossain and
                  George Loukas and
                  Elham Hassanain and
                  Syed Sadiqur Rahman and
                  Mohammed F. Alhamid and
                  Mohsen Guizani},
  title        = {Blockchain-Based Mobile Edge Computing Framework for Secure Therapy
                  Applications},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {72469--72478},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2881246},
  doi          = {10.1109/ACCESS.2018.2881246},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RahmanHLHRAG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Tan18,
  author       = {Syh{-}Yuan Tan},
  title        = {Comment on "Secure Data Access Control With Ciphertext Update and
                  Computation Outsourcing in Fog Computing for Internet of Things"},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {22464--22465},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2827698},
  doi          = {10.1109/ACCESS.2018.2827698},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/Tan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhaoZ18,
  author       = {Yingsi Zhao and
                  Qing{-}An Zeng},
  title        = {Secure and Efficient Product Information Retrieval in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {14747--14754},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2816919},
  doi          = {10.1109/ACCESS.2018.2816919},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhaoZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/Humble18,
  author       = {Travis S. Humble},
  title        = {Consumer Applications of Quantum Computing: {A} Promising Approach
                  for Secure Computation, Trusted Data Storage, and Efficient Applications},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {7},
  number       = {6},
  pages        = {8--14},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCE.2017.2755298},
  doi          = {10.1109/MCE.2017.2755298},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/Humble18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/PuthalZ18,
  author       = {Deepak Puthal and
                  Xuyun Zhang},
  title        = {Secure Computing for the Internet of Things and Network Edges: Protecting
                  Communication in the Worldwide Network of Devices},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {7},
  number       = {6},
  pages        = {29--30},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCE.2018.2851738},
  doi          = {10.1109/MCE.2018.2851738},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/PuthalZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/PuthalONPMZ18,
  author       = {Deepak Puthal and
                  Mohammad S. Obaidat and
                  Priyadarsi Nanda and
                  Mukesh Prasad and
                  Saraju P. Mohanty and
                  Albert Y. Zomaya},
  title        = {Secure and Sustainable Load Balancing of Edge Data Centers in Fog
                  Computing},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {5},
  pages        = {60--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1700795},
  doi          = {10.1109/MCOM.2018.1700795},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/PuthalONPMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZCX18,
  author       = {Jin Li and
                  Yinghui Zhang and
                  Xiaofeng Chen and
                  Yang Xiang},
  title        = {Secure attribute-based data sharing for resource-limited users in
                  cloud computing},
  journal      = {Comput. Secur.},
  volume       = {72},
  pages        = {1--12},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.08.007},
  doi          = {10.1016/J.COSE.2017.08.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiZCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/SaeedAJ18,
  author       = {Ahmed Saeed and
                  Ali Ahmadinia and
                  Mike Just},
  title        = {Hardware-Assisted Secure Communication in Embedded and Multi-Core
                  Computing Systems},
  journal      = {Comput.},
  volume       = {7},
  number       = {2},
  pages        = {31},
  year         = {2018},
  url          = {https://doi.org/10.3390/computers7020031},
  doi          = {10.3390/COMPUTERS7020031},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/SaeedAJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/Yoon18,
  author       = {John Yoon},
  title        = {Trustworthiness of Dynamic Moving Sensors for Secure Mobile Edge Computing},
  journal      = {Comput.},
  volume       = {7},
  number       = {4},
  pages        = {63},
  year         = {2018},
  url          = {https://doi.org/10.3390/computers7040063},
  doi          = {10.3390/COMPUTERS7040063},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/Yoon18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/Henkel18,
  author       = {J{\"{o}}rg Henkel},
  title        = {Design and Test of Energy-Efficient, High-Performance, and Secure
                  Computing Technologies via Accelerators},
  journal      = {{IEEE} Des. Test},
  volume       = {35},
  number       = {1},
  pages        = {4},
  year         = {2018},
  url          = {https://doi.org/10.1109/MDAT.2017.2785268},
  doi          = {10.1109/MDAT.2017.2785268},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dt/Henkel18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HuangYS18,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Mansuo Shen},
  title        = {Corrigendum to "Secure and efficient data collaboration with hierarchical
                  attribute-based encryption in cloud computing" [Future Gener. Comput.
                  Syst. 72 {(2017)} 239-249]},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {1534},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.05.041},
  doi          = {10.1016/J.FUTURE.2018.05.041},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HuangYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuLZDZMS18,
  author       = {Jian Liu and
                  Jiangtao Li and
                  Lei Zhang and
                  Feifei Dai and
                  Yuanfei Zhang and
                  Xinyu Meng and
                  Jian Shen},
  title        = {Secure intelligent traffic light control using fog computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {817--824},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.02.017},
  doi          = {10.1016/J.FUTURE.2017.02.017},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuLZDZMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuZLL18,
  author       = {Yi Liu and
                  Yinghui Zhang and
                  Jie Ling and
                  Zhusong Liu},
  title        = {Secure and fine-grained access control on e-healthcare records in
                  mobile cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {1020--1026},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.12.027},
  doi          = {10.1016/J.FUTURE.2016.12.027},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuZLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MahmoodLCNKSR18,
  author       = {Khalid Mahmood and
                  Xiong Li and
                  Shehzad Ashraf Chaudhry and
                  Husnain Naqvi and
                  Saru Kumari and
                  Arun Kumar Sangaiah and
                  Joel J. P. C. Rodrigues},
  title        = {Pairing based anonymous and secure key agreement protocol for smart
                  grid edge computing infrastructure},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {88},
  pages        = {491--500},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.06.004},
  doi          = {10.1016/J.FUTURE.2018.06.004},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/MahmoodLCNKSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/StergiouPKG18,
  author       = {Christos Stergiou and
                  Kostas E. Psannis and
                  Byung{-}Gyu Kim and
                  Brij B. Gupta},
  title        = {Secure integration of IoT and Cloud Computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {964--975},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.11.031},
  doi          = {10.1016/J.FUTURE.2016.11.031},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/StergiouPKG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangWD18,
  author       = {Huaqun Wang and
                  Zhiwei Wang and
                  Josep Domingo{-}Ferrer},
  title        = {Anonymous and secure aggregation scheme in fog-based public cloud
                  computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {712--719},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.02.032},
  doi          = {10.1016/J.FUTURE.2017.02.032},
  timestamp    = {Sat, 03 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZuoSWXJ18,
  author       = {Cong Zuo and
                  Jun Shao and
                  Guiyi Wei and
                  Mande Xie and
                  Min Ji},
  title        = {CCA-secure {ABE} with outsourced decryption for fog computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {730--738},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.10.028},
  doi          = {10.1016/J.FUTURE.2016.10.028},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZuoSWXJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/WeiZM18,
  author       = {Fushan Wei and
                  Ruijie Zhang and
                  Chuangui Ma},
  title        = {A Provably Secure Anonymous Two-Factor Authenticated Key Exchange
                  Protocol for Cloud Computing},
  journal      = {Fundam. Informaticae},
  volume       = {157},
  number       = {1-2},
  pages        = {201--220},
  year         = {2018},
  url          = {https://doi.org/10.3233/FI-2018-1626},
  doi          = {10.3233/FI-2018-1626},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/WeiZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hcis/KimJ18,
  author       = {Hyun{-}Woo Kim and
                  Young{-}Sik Jeong},
  title        = {Secure Authentication-Management human-centric Scheme for trusting
                  personal resource information on mobile cloud computing with blockchain},
  journal      = {Hum. centric Comput. Inf. Sci.},
  volume       = {8},
  pages        = {11},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13673-018-0136-7},
  doi          = {10.1186/S13673-018-0136-7},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hcis/KimJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/BoussifAC18,
  author       = {Mohamed Boussif and
                  Noureddine Aloui and
                  Adnene Cherif},
  title        = {Secured cloud computing for medical data based on watermarking and
                  encryption},
  journal      = {{IET} Networks},
  volume       = {7},
  number       = {5},
  pages        = {294--298},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-net.2017.0180},
  doi          = {10.1049/IET-NET.2017.0180},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/BoussifAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcac/Ko18,
  author       = {Hoon Ko},
  title        = {A Study on Secure Contents Strategies for Applications With {DRM}
                  on Cloud Computing},
  journal      = {Int. J. Cloud Appl. Comput.},
  volume       = {8},
  number       = {1},
  pages        = {143--153},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJCAC.2018010107},
  doi          = {10.4018/IJCAC.2018010107},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcac/Ko18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/BaharonAAAI18,
  author       = {Mohd Rizuan Baharon and
                  Mohd Faizal Abdollah and
                  Nur Azman Abu and
                  Zaheera Zainal Abidin and
                  Ariff Idris},
  title        = {Secure video transcoding in Mobile Cloud Computing},
  journal      = {Int. J. Comput.},
  volume       = {17},
  pages        = {208--218},
  year         = {2018},
  url          = {https://doi.org/10.47839/ijc.17.4.1142},
  doi          = {10.47839/IJC.17.4.1142},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/BaharonAAAI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ThakareK18,
  author       = {Vaishali R. Thakare and
                  John Singh K},
  title        = {An efficient ternary tree-based {TGDH} protocol for dynamic secure
                  group data sharing in cloud computing},
  journal      = {Int. J. Embed. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {273--286},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJES.2018.10014924},
  doi          = {10.1504/IJES.2018.10014924},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/ThakareK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/ZhuH18,
  author       = {Shuaishuai Zhu and
                  Yiliang Han},
  title        = {Secure data outsourcing scheme in cloud computing with attribute-based
                  encryption},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {12},
  number       = {2},
  pages        = {128--136},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJHPCN.2018.10015542},
  doi          = {10.1504/IJHPCN.2018.10015542},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/ZhuH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/LiuXYY18,
  author       = {Xuejiao Liu and
                  Yingjie Xia and
                  Wei Yang and
                  Fengli Yang},
  title        = {Secure and efficient querying over personal health records in cloud
                  computing},
  journal      = {Neurocomputing},
  volume       = {274},
  pages        = {99--105},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.neucom.2016.06.100},
  doi          = {10.1016/J.NEUCOM.2016.06.100},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/LiuXYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijrsda/BuchadeI18,
  author       = {Amar Buchade and
                  Rajesh Ingle},
  title        = {Secure Mechanisms for Key Shares in Cloud Computing},
  journal      = {Int. J. Rough Sets Data Anal.},
  volume       = {5},
  number       = {3},
  pages        = {21--41},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJRSDA.2018070102},
  doi          = {10.4018/IJRSDA.2018070102},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijrsda/BuchadeI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itl/RaniA18,
  author       = {Shalli Rani and
                  Syed Hassan Ahmed},
  title        = {Secure edge computing: An architectural approach and industrial use
                  case},
  journal      = {Internet Technol. Lett.},
  volume       = {1},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/itl2.68},
  doi          = {10.1002/ITL2.68},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itl/RaniA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jco/PradhanJ18,
  author       = {Dinabandhu Pradhan and
                  Anupriya Jha},
  title        = {On computing a minimum secure dominating set in block graphs},
  journal      = {J. Comb. Optim.},
  volume       = {35},
  number       = {2},
  pages        = {613--631},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10878-017-0197-y},
  doi          = {10.1007/S10878-017-0197-Y},
  timestamp    = {Mon, 25 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jco/PradhanJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdmdh/MarwanKO18a,
  author       = {Mbarek Marwan and
                  Ali Kartit and
                  Hassan Ouahmane},
  title        = {A Secured Data Processing Technique for Effective Utilization of Cloud
                  Computing},
  journal      = {J. Data Min. Digit. Humanit.},
  volume       = {2018},
  year         = {2018},
  url          = {https://doi.org/10.46298/jdmdh.4085},
  doi          = {10.46298/JDMDH.4085},
  timestamp    = {Tue, 14 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdmdh/MarwanKO18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jeco/MarwanKO18,
  author       = {Mbarek Marwan and
                  Ali Kartit and
                  Hassan Ouahmane},
  title        = {A Framework to Secure Medical Image Storage in Cloud Computing Environment},
  journal      = {J. Electron. Commer. Organ.},
  volume       = {16},
  number       = {1},
  pages        = {1--16},
  year         = {2018},
  url          = {https://doi.org/10.4018/JECO.2018010101},
  doi          = {10.4018/JECO.2018010101},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jeco/MarwanKO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/SaleemKSAK18,
  author       = {Ahsan Saleem and
                  Abid Khan and
                  Furqan Shahid and
                  Masoom Alam and
                  Muhammad Khurram Khan},
  title        = {Recent advancements in garbled computing: How far have we come towards
                  achieving secure, efficient and reusable garbled circuits},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {108},
  pages        = {1--19},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.02.006},
  doi          = {10.1016/J.JNCA.2018.02.006},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/SaleemKSAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/DongZDZG18,
  author       = {Ping Dong and
                  Tao Zheng and
                  Xiaojiang Du and
                  Hongke Zhang and
                  Mohsen Guizani},
  title        = {{SVCC-HSR:} Providing Secure Vehicular Cloud Computing for Intelligent
                  High-Speed Rail},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {3},
  pages        = {64--71},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700330},
  doi          = {10.1109/MNET.2018.1700330},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/DongZDZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/FanWSLY18,
  author       = {Kai Fan and
                  Xin Wang and
                  Katsuya Suto and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected
                  Vehicular Cloud Computing},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {3},
  pages        = {52--57},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700327},
  doi          = {10.1109/MNET.2018.1700327},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/FanWSLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/HeZLWH18,
  author       = {Jackson He and
                  Yaoxue Zhang and
                  Ju Lu and
                  Ming Wu and
                  Fujin Huang},
  title        = {Block-Stream as a Service: {A} More Secure, Nimble, and Dynamically
                  Balanced Cloud Service Model for Ambient Computing},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {1},
  pages        = {126--132},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700167},
  doi          = {10.1109/MNET.2018.1700167},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/HeZLWH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ShaoW18,
  author       = {Jun Shao and
                  Guiyi Wei},
  title        = {Secure Outsourced Computation in Connected Vehicular Cloud Computing},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {3},
  pages        = {36--41},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700345},
  doi          = {10.1109/MNET.2018.1700345},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ShaoW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/YangNLP18,
  author       = {Yixian Yang and
                  Xinxin Niu and
                  Lixiang Li and
                  Haipeng Peng},
  title        = {A Secure and Efficient Transmission Method in Connected Vehicular
                  Cloud Computing},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {3},
  pages        = {14--19},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700324},
  doi          = {10.1109/MNET.2018.1700324},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/YangNLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/AlpernasFFRSSW18,
  author       = {Kalev Alpernas and
                  Cormac Flanagan and
                  Sadjad Fouladi and
                  Leonid Ryzhyk and
                  Mooly Sagiv and
                  Thomas Schmitz and
                  Keith Winstein},
  title        = {Secure serverless computing using dynamic information flow control},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {2},
  number       = {{OOPSLA}},
  pages        = {118:1--118:26},
  year         = {2018},
  url          = {https://doi.org/10.1145/3276488},
  doi          = {10.1145/3276488},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/AlpernasFFRSSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MengWWW18,
  author       = {Tianhui Meng and
                  Katinka Wolter and
                  Huaming Wu and
                  Qiushi Wang},
  title        = {A secure and cost-efficient offloading policy for Mobile Cloud Computing
                  against timing attacks},
  journal      = {Pervasive Mob. Comput.},
  volume       = {45},
  pages        = {4--18},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.pmcj.2018.01.007},
  doi          = {10.1016/J.PMCJ.2018.01.007},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/MengWWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/FanWJLY18,
  author       = {Kai Fan and
                  Wei Wang and
                  Wei Jiang and
                  Hui Li and
                  Yintang Yang},
  title        = {Secure ultra-lightweight {RFID} mutual authentication protocol based
                  on transparent computing for IoV},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {4},
  pages        = {723--734},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0553-9},
  doi          = {10.1007/S12083-017-0553-9},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/FanWJLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SharmaK18,
  author       = {Geeta Sharma and
                  Sheetal Kalra},
  title        = {Identity based secure authentication scheme based on quantum key distribution
                  for cloud computing},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {2},
  pages        = {220--234},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-016-0528-2},
  doi          = {10.1007/S12083-016-0528-2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SharmaK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/LeeLKKLK18,
  author       = {Seongkee Lee and
                  Sanghoon Lee and
                  Taein Kang and
                  Miyoung Kwon and
                  Nohbok Lee and
                  Hoon{-}Kyu Kim},
  title        = {Resiliency of mobile {OS} security for secure personal ubiquitous
                  computing},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {22},
  number       = {1},
  pages        = {23--34},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00779-017-1098-x},
  doi          = {10.1007/S00779-017-1098-X},
  timestamp    = {Sat, 09 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/puc/LeeLKKLK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OppermannTTS18,
  author       = {Alexander Oppermann and
                  Federico Grasso Toro and
                  Florian Thiel and
                  Jean{-}Pierre Seifert},
  title        = {Secure Cloud Computing: Reference Architecture for Measuring Instrument
                  under Legal Control},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.18},
  doi          = {10.1002/SPY2.18},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/OppermannTTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuYWXD18,
  author       = {Guoxiu Liu and
                  Geng Yang and
                  Huaqun Wang and
                  Yang Xiang and
                  Hua Dai},
  title        = {A Novel Secure Scheme for Supporting Complex {SQL} Queries over Encrypted
                  Databases in Cloud Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7383514:1--7383514:15},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7383514},
  doi          = {10.1155/2018/7383514},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuYWXD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangSY0RZ18,
  author       = {Yinghui Zhang and
                  Haonan Su and
                  Menglei Yang and
                  Dong Zheng and
                  Fang Ren and
                  Qinglan Zhao},
  title        = {Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing
                  Data in Cloud Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {9081814:1--9081814:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/9081814},
  doi          = {10.1155/2018/9081814},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangSY0RZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HuangYS18,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Yuxiang Shi},
  title        = {SmartVeh: Secure and Efficient Message Access Control and Authentication
                  for Vehicular Cloud Computing},
  journal      = {Sensors},
  volume       = {18},
  number       = {2},
  pages        = {666},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18020666},
  doi          = {10.3390/S18020666},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HuangYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/Mora-GimenoMMV18,
  author       = {Francisco Jos{\'{e}} Mora{-}Gimeno and
                  Higinio Mora Mora and
                  Diego Marcos{-}Jorquera and
                  Bruno Volckaert},
  title        = {A Secure Multi-Tier Mobile Edge Computing Model for Data Processing
                  Offloading Based on Degree of Trust},
  journal      = {Sensors},
  volume       = {18},
  number       = {10},
  pages        = {3211},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18103211},
  doi          = {10.3390/S18103211},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/Mora-GimenoMMV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/XuTFZXC18,
  author       = {Qian Xu and
                  Chengxiang Tan and
                  Zhijie Fan and
                  Wenye Zhu and
                  Ya Xiao and
                  Fujia Cheng},
  title        = {Secure Data Access Control for Fog Computing Based on Multi-Authority
                  Attribute-Based Signcryption with Computation Outsourcing and Attribute
                  Revocation},
  journal      = {Sensors},
  volume       = {18},
  number       = {5},
  pages        = {1609},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18051609},
  doi          = {10.3390/S18051609},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/XuTFZXC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ChenD18,
  author       = {Chin{-}Ling Chen and
                  Yong{-}Yuan Deng},
  title        = {A fair and secure group buying system based on arbitration computing
                  mechanism},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {1},
  pages        = {119--135},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-016-2313-9},
  doi          = {10.1007/S00500-016-2313-9},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ChenD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhangYZLWC18,
  author       = {Yinghui Zhang and
                  Menglei Yang and
                  Dong Zheng and
                  Pengzhen Lang and
                  Axin Wu and
                  Chen Chen},
  title        = {Efficient and secure big data storage system with leakage resilience
                  in cloud computing},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {23},
  pages        = {7763--7772},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-018-3435-z},
  doi          = {10.1007/S00500-018-3435-Z},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/ZhangYZLWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/software/MakitaloOKAKM17,
  author       = {Niko M{\"{a}}kitalo and
                  Aleksandr Ometov and
                  Joona Kannisto and
                  Sergey Andreev and
                  Yevgeni Koucheryavy and
                  Tommi Mikkonen},
  title        = {Safe, Secure Executions at the Network Edge: Coordinating Cloud, Edge,
                  and Fog Computing},
  journal      = {{IEEE} Softw.},
  volume       = {35},
  number       = {1},
  pages        = {30--37},
  year         = {2018},
  url          = {https://doi.org/10.1109/MS.2017.4541037},
  doi          = {10.1109/MS.2017.4541037},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/software/MakitaloOKAKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sp/SiddiquiLP18,
  author       = {Zahid Ali Siddiqui and
                  Jeong{-}A Lee and
                  Unsang Park},
  title        = {SEDC-Based Hardware-Level Fault Tolerance and Fault Secure Checker
                  Design for Big Data and Cloud Computing},
  journal      = {Sci. Program.},
  volume       = {2018},
  pages        = {7306837:1--7306837:16},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7306837},
  doi          = {10.1155/2018/7306837},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sp/SiddiquiLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/JaleelAS18,
  author       = {Abdul Jaleel and
                  Shazia Arshad and
                  Muhammad Shoaib},
  title        = {A Secure, Scalable and Elastic Autonomic Computing Systems Paradigm:
                  Supporting Dynamic Adaptation of Self-* Services from an Autonomic
                  Cloud},
  journal      = {Symmetry},
  volume       = {10},
  number       = {5},
  pages        = {141},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10050141},
  doi          = {10.3390/SYM10050141},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/JaleelAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/LiuTCL18,
  author       = {Chao{-}Liang Liu and
                  Wang{-}Jui Tsai and
                  Ting{-}Yi Chang and
                  Ta{-}Ming Liu},
  title        = {Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated
                  Key Agreement Protocol for Mobile Distributed Computing Environments},
  journal      = {Symmetry},
  volume       = {10},
  number       = {4},
  pages        = {84},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10040084},
  doi          = {10.3390/SYM10040084},
  timestamp    = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/LiuTCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiSHGXX18,
  author       = {Ruixuan Li and
                  Chenglin Shen and
                  Heng He and
                  Xiwu Gu and
                  Zhiyong Xu and
                  Cheng{-}Zhong Xu},
  title        = {A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {2},
  pages        = {344--357},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2017.2649685},
  doi          = {10.1109/TCC.2017.2649685},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/LiSHGXX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/WeiLH18,
  author       = {Jianghong Wei and
                  Wenfen Liu and
                  Xuexian Hu},
  title        = {Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based
                  Encryption},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {4},
  pages        = {1136--1148},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2016.2545668},
  doi          = {10.1109/TCC.2016.2545668},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/WeiLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/FuLCBZ18,
  author       = {Junsong Fu and
                  Yun Liu and
                  Han{-}Chieh Chao and
                  Bharat K. Bhargava and
                  Zhen{-}Jiang Zhang},
  title        = {Secure Data Storage and Searching for Industrial IoT by Integrating
                  Fog Computing and Cloud Computing},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {14},
  number       = {10},
  pages        = {4519--4528},
  year         = {2018},
  url          = {https://doi.org/10.1109/TII.2018.2793350},
  doi          = {10.1109/TII.2018.2793350},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/FuLCBZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/SuXLPPL18,
  author       = {Zhou Su and
                  Qichao Xu and
                  Jun Luo and
                  Huayan Pu and
                  Yan Peng and
                  Rongxing Lu},
  title        = {A Secure Content Caching Scheme for Disaster Backup in Fog Computing
                  Enabled Mobile Social Networks},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {14},
  number       = {10},
  pages        = {4579--4589},
  year         = {2018},
  url          = {https://doi.org/10.1109/TII.2018.2849984},
  doi          = {10.1109/TII.2018.2849984},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/SuXLPPL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/NkenyereyePR18,
  author       = {Lewis Nkenyereye and
                  Youngho Park and
                  Kyung{-}Hyune Rhee},
  title        = {Secure vehicle traffic data dissemination and analysis protocol in
                  vehicular cloud computing},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {3},
  pages        = {1024--1044},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-016-1773-0},
  doi          = {10.1007/S11227-016-1773-0},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/NkenyereyePR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ZhangSWZJ18,
  author       = {Yuanyu Zhang and
                  Yulong Shen and
                  Hua Wang and
                  Yanchun Zhang and
                  Xiaohong Jiang},
  title        = {On Secure Wireless Communications for Service Oriented Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {318--328},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSC.2015.2478453},
  doi          = {10.1109/TSC.2015.2478453},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ZhangSWZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wc/HeYZY18,
  author       = {Ying He and
                  F. Richard Yu and
                  Nan Zhao and
                  Hongxi Yin},
  title        = {Secure Social Networks in 5G Systems with Mobile Edge Computing, Caching,
                  and Device-to-Device Communications},
  journal      = {{IEEE} Wirel. Commun.},
  volume       = {25},
  number       = {3},
  pages        = {103--109},
  year         = {2018},
  url          = {https://doi.org/10.1109/MWC.2018.1700274},
  doi          = {10.1109/MWC.2018.1700274},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wc/HeYZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LiJWFZW18,
  author       = {Ye Li and
                  Zoe Lin Jiang and
                  Xuan Wang and
                  Jun{-}bin Fang and
                  En Zhang and
                  Xianmin Wang},
  title        = {Securely Outsourcing {ID3} Decision Tree in Cloud Computing},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {2385150:1--2385150:10},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/2385150},
  doi          = {10.1155/2018/2385150},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LiJWFZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/XuWYRZZ18,
  author       = {Yang Xu and
                  Guojun Wang and
                  Jidian Yang and
                  Ju Ren and
                  Yaoxue Zhang and
                  Cheng Zhang},
  title        = {Towards Secure Network Computing Services for Lightweight Clients
                  Using Blockchain},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2018},
  pages        = {2051693:1--2051693:12},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/2051693},
  doi          = {10.1155/2018/2051693},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/XuWYRZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/3pgcic/WangZSXC18,
  author       = {Xu An Wang and
                  Shuaishuai Zhu and
                  Arun Kumar Sangaiah and
                  Shuai Xue and
                  Yunfei Cao},
  editor       = {Fatos Xhafa and
                  Fang{-}Yie Leu and
                  Massimo Ficco and
                  Chao{-}Tung Yang},
  title        = {More Secure Outsource Protocol for Matrix Multiplication in Cloud
                  Computing},
  booktitle    = {Advances on P2P, Parallel, Grid, Cloud and Internet Computing, Proceedings
                  of the 13th International Conference on P2P, Parallel, Grid, Cloud
                  and Internet Computing, 3PGCIC-2018, Taichung, Taiwan, 27-29 October},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {24},
  pages        = {293--299},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02607-3\_26},
  doi          = {10.1007/978-3-030-02607-3\_26},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/3pgcic/WangZSXC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShenL0HCZ18,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Jiageng Chen and
                  Mingwu Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Secure Publicly Verifiable Computation with Polynomial Commitment
                  in Cloud Computing},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {417--430},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_24},
  doi          = {10.1007/978-3-319-93638-3\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ShenL0HCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acssc/LiCWG18,
  author       = {Bingcong Li and
                  Tianyi Chen and
                  Xin Wang and
                  Georgios B. Giannakis},
  editor       = {Michael B. Matthews},
  title        = {Secure Edge Computing in IoT via Online Learning},
  booktitle    = {52nd Asilomar Conference on Signals, Systems, and Computers, {ACSSC}
                  2018, Pacific Grove, CA, USA, October 28-31, 2018},
  pages        = {2149--2153},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACSSC.2018.8645223},
  doi          = {10.1109/ACSSC.2018.8645223},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acssc/LiCWG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amia/OxleyRCWC18,
  author       = {Peter Oxley and
                  John Ruffing and
                  Thomas R. Campion Jr. and
                  Terrie R. Wheeler and
                  Curtis L. Cole},
  title        = {Design and Implementation of a Secure Computing Environment for Analysis
                  of Sensitive Data at an Academic Medical Center},
  booktitle    = {{AMIA} 2018, American Medical Informatics Association Annual Symposium,
                  San Francisco, CA, November 3-7, 2018},
  publisher    = {{AMIA}},
  year         = {2018},
  url          = {https://knowledge.amia.org/67852-amia-1.4259402/t004-1.4263758/t004-1.4263759/2976792-1.4263862/2976873-1.4263859},
  timestamp    = {Wed, 17 Apr 2024 11:47:15 +0200},
  biburl       = {https://dblp.org/rec/conf/amia/OxleyRCWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/WinderickxSM18,
  author       = {Jori Winderickx and
                  Dave Singel{\'{e}}e and
                  Nele Mentens},
  title        = {HeComm: End-to-end secured communication in a heterogeneous IoT environment
                  via fog computing},
  booktitle    = {15th {IEEE} Annual Consumer Communications {\&} Networking Conference,
                  {CCNC} 2018, Las Vegas, NV, USA, January 12-15, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CCNC.2018.8319245},
  doi          = {10.1109/CCNC.2018.8319245},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/WinderickxSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/CristalUMCCBJAS18,
  author       = {Adri{\'{a}}n Cristal and
                  Osman S. Unsal and
                  Xavier Martorell and
                  Paul Carpenter and
                  Ra{\'{u}}l de la Cruz and
                  Leonardo Bautista{-}Gomez and
                  Daniel Jim{\'{e}}nez{-}Gonz{\'{a}}lez and
                  Carlos {\'{A}}lvarez and
                  Behzad Salami and
                  Sergi Madonar and
                  Miquel Peric{\`{a}}s and
                  Pedro Trancoso and
                  Micha vor dem Berge and
                  Gunnar Billung{-}Meyer and
                  Stefan Krupop and
                  Wolfgang Christmann and
                  Frank Klawonn and
                  Amani Mihklafi and
                  Tobias Becker and
                  Georgi Gaydadjiev and
                  Hans Salomonsson and
                  Devdatt P. Dubhashi and
                  Oron Port and
                  Yoav Etsion and
                  Vesna Nowack and
                  Christof Fetzer and
                  Jens Hagemeyer and
                  Thorsten Jungeblut and
                  Nils Kucza and
                  Martin Kaiser and
                  Mario Porrmann and
                  Marcelo Pasin and
                  Valerio Schiavoni and
                  Isabelly Rocha and
                  Christian G{\"{o}}ttel and
                  Pascal Felber},
  editor       = {David R. Kaeli and
                  Miquel Peric{\`{a}}s},
  title        = {LEGaTO: towards energy-efficient, secure, fault-tolerant toolset for
                  heterogeneous computing},
  booktitle    = {Proceedings of the 15th {ACM} International Conference on Computing
                  Frontiers, {CF} 2018, Ischia, Italy, May 08-10, 2018},
  pages        = {276--278},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3203217.3205339},
  doi          = {10.1145/3203217.3205339},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cf/CristalUMCCBJAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cicba/TribediSR18,
  author       = {Debarpan Tribedi and
                  Dipanwita Sadhukhan and
                  Sangram Ray},
  editor       = {Jyotsna Kumar Mandal and
                  Somnath Mukhopadhyay and
                  Paramartha Dutta and
                  Kousik Dasgupta},
  title        = {Cryptanalysis of a Secure and Privacy Preserving Mobile Wallet Scheme
                  with Outsourced Verification in Cloud Computing},
  booktitle    = {Computational Intelligence, Communications, and Business Analytics
                  - Second International Conference, {CICBA} 2018, Kalyani, India, July
                  27-28, 2018, Revised Selected Papers, Part {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {1031},
  pages        = {411--424},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-8581-0\_33},
  doi          = {10.1007/978-981-13-8581-0\_33},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cicba/TribediSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/BazmLSM18,
  author       = {Mohammad{-}Mahdi Bazm and
                  Marc Lacoste and
                  Mario S{\"{u}}dholt and
                  Jean{-}Marc Menaud},
  title        = {Secure Distributed Computing on Untrusted Fog Infrastructures Using
                  Trusted Linux Containers},
  booktitle    = {2018 {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018},
  pages        = {239--242},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CloudCom2018.2018.00053},
  doi          = {10.1109/CLOUDCOM2018.2018.00053},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/BazmLSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BrasileiroBB18,
  author       = {Francisco V. Brasileiro and
                  Andrey Brito and
                  Ignacio Blanquer},
  title        = {{ATMOSPHERE:} Adaptive, Trustworthy, Manageable, Orchestrated, Secure,
                  Privacy-Assuring, Hybrid Ecosystem for REsilient Cloud Computing},
  booktitle    = {48th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks Workshops, {DSN} Workshops 2018, Luxembourg, June 25-28,
                  2018},
  pages        = {51--52},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.ieeecomputersociety.org/10.1109/DSN-W.2018.00025},
  doi          = {10.1109/DSN-W.2018.00025},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/BrasileiroBB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/AlrowailyL18,
  author       = {Mohammed Alrowaily and
                  Zhuo Lu},
  title        = {Secure Edge Computing in IoT Systems: Review and Case Studies},
  booktitle    = {2018 {IEEE/ACM} Symposium on Edge Computing, {SEC} 2018, Seattle,
                  WA, USA, October 25-27, 2018},
  pages        = {440--444},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SEC.2018.00060},
  doi          = {10.1109/SEC.2018.00060},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/edge/AlrowailyL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edge/HuangCCZ18,
  author       = {Baiyi Huang and
                  Xiuzhen Cheng and
                  Yuan Cao and
                  Le Zhang},
  title        = {Lightweight Hardware Based Secure Authentication Scheme for Fog Computing},
  booktitle    = {2018 {IEEE/ACM} Symposium on Edge Computing, {SEC} 2018, Seattle,
                  WA, USA, October 25-27, 2018},
  pages        = {433--439},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SEC.2018.00059},
  doi          = {10.1109/SEC.2018.00059},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/edge/HuangCCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/OppermannETS18,
  author       = {Alexander Oppermann and
                  Marko Esche and
                  Florian Thiel and
                  Jean{-}Pierre Seifert},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture
                  in Legal Metrology},
  booktitle    = {Proceedings of the 2018 Federated Conference on Computer Science and
                  Information Systems, FedCSIS 2018, Pozna{\'{n}}, Poland, September
                  9-12, 2018},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {15},
  pages        = {593--602},
  year         = {2018},
  url          = {https://doi.org/10.15439/2018F226},
  doi          = {10.15439/2018F226},
  timestamp    = {Tue, 23 Apr 2024 10:05:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/OppermannETS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/QianLPWAC18,
  author       = {Kai Qian and
                  Dan Chia{-}Tien Lo and
                  Reza M. Parizi and
                  Fan Wu and
                  Emmanuel Agu and
                  Bei{-}Tseng Chu},
  title        = {Authentic Learning Secure Software Development {(SSD)} in Computing
                  Education},
  booktitle    = {{IEEE} Frontiers in Education Conference, {FIE} 2018, San Jose, CA,
                  USA, October 3-6, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/FIE.2018.8659217},
  doi          = {10.1109/FIE.2018.8659217},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fie/QianLPWAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmec/AlmajaliSAE18,
  author       = {Sufyan Almajali and
                  Haythem Bany Salameh and
                  Moussa Ayyash and
                  Hany Elgala},
  title        = {A framework for efficient and secured mobility of IoT devices in mobile
                  edge computing},
  booktitle    = {Third International Conference on Fog and Mobile Edge Computing, {FMEC}
                  2018, Barcelona, Spain, April 23-26, 2018},
  pages        = {58--62},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/FMEC.2018.8364045},
  doi          = {10.1109/FMEC.2018.8364045},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fmec/AlmajaliSAE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fnss/QureshiMR18,
  author       = {Amna Qureshi and
                  David Meg{\'{\i}}as and
                  Helena Rif{\`{a}}{-}Pous},
  editor       = {Robin Doss and
                  Selwyn Piramuthu and
                  Wei Zhou},
  title        = {VSPReP: Verifiable, Secure and Privacy-Preserving Remote Polling with
                  Untrusted Computing Devices},
  booktitle    = {Future Network Systems and Security - 4th International Conference,
                  {FNSS} 2018, Paris, France, July 9-11, 2018, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {878},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94421-0\_5},
  doi          = {10.1007/978-3-319-94421-0\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fnss/QureshiMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/PesaraPA18,
  author       = {Akshay Chandra Pesara and
                  Vikram Patil and
                  Pradeep K. Atrey},
  editor       = {Panagiotis Bouros and
                  Matthias Renz and
                  Dimitris Sacharidis},
  title        = {Secure Computing of {GPS} Trajectory Similarity: {A} Review},
  booktitle    = {Proceedings of the 2nd {ACM} {SIGSPATIAL} Workshop on Recommendations
                  for Location-based Services and Social Networks, LocalRec@SIGSPATIAL
                  2018, Seattle, WA, USA, November 6, 2018},
  pages        = {3:1--3:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3282825.3282832},
  doi          = {10.1145/3282825.3282832},
  timestamp    = {Wed, 29 May 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/gis/PesaraPA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HuangLY18,
  author       = {Qinlong Huang and
                  Nan Li and
                  Yixian Yang},
  title        = {{DACSC:} Dynamic and Fine-Grained Access Control for Secure Data Collaboration
                  in Cloud Computing},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8648113},
  doi          = {10.1109/GLOCOM.2018.8648113},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HuangLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiaoFGHOK18,
  author       = {Qi Liao and
                  Thomas Fischer and
                  Jack Gao and
                  Faisal Hafeez and
                  Carl Oechsner and
                  Jana Knode},
  title        = {A Secure End-to-End Cloud Computing Solution for Emergency Management
                  with UAVs},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8648094},
  doi          = {10.1109/GLOCOM.2018.8648094},
  timestamp    = {Tue, 26 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiaoFGHOK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/green/KlineJ18,
  author       = {Donald Kline Jr. and
                  Alex K. Jones},
  title        = {Achieving Secure, Reliable, and Sustainable Next Generation Computing
                  Memories},
  booktitle    = {Ninth International Green and Sustainable Computing Conference, {IGSC}
                  2018, Pittsburgh, PA, USA, October 22-24, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IGCC.2018.8752128},
  doi          = {10.1109/IGCC.2018.8752128},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/green/KlineJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/green/ZhangY18,
  author       = {Zhiming Zhang and
                  Qiaoyan Yu},
  title        = {A Survey on Energy Efficiency Techniques for Secure Computing Systems},
  booktitle    = {Ninth International Green and Sustainable Computing Conference, {IGSC}
                  2018, Pittsburgh, PA, USA, October 22-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/IGCC.2018.8752109},
  doi          = {10.1109/IGCC.2018.8752109},
  timestamp    = {Thu, 04 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/green/ZhangY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/i2mtc/OppermannTTS18,
  author       = {Alexander Oppermann and
                  Federico Grasso Toro and
                  Florian Thiel and
                  Jean{-}Pierre Seifert},
  title        = {Secure cloud computing: Continuous anomaly detection approach in legal
                  metrology},
  booktitle    = {{IEEE} International Instrumentation and Measurement Technology Conference,
                  {I2MTC} 2018, Houston, TX, USA, May 14-17, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/I2MTC.2018.8409767},
  doi          = {10.1109/I2MTC.2018.8409767},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/i2mtc/OppermannTTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChenFXSYW18,
  author       = {Zhenzhu Chen and
                  Anmin Fu and
                  Ke Xiao and
                  Mang Su and
                  Yan Yu and
                  Yongli Wang},
  title        = {Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion
                  without Precondition in Cloud Computing},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422326},
  doi          = {10.1109/ICC.2018.8422326},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ChenFXSYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/DangDOWLL18,
  author       = {Lintao Dang and
                  Mianxiong Dong and
                  Kaoru Ota and
                  Jun Wu and
                  Jianhua Li and
                  Gaolei Li},
  title        = {Resource-Efficient Secure Data Sharing for Information Centric E-Health
                  System Using Fog Computing},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422844},
  doi          = {10.1109/ICC.2018.8422844},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/DangDOWLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/AdebayoRN018,
  author       = {Abdulhamid Adebayo and
                  Danda B. Rawat and
                  Lina Ni and
                  Min Song},
  title        = {Group-Query-as-a-Service for Secure Low-Latency Opportunistic {RF}
                  Spectrum Access in Mobile Edge Computing Enabled Wireless Networks},
  booktitle    = {27th International Conference on Computer Communication and Networks,
                  {ICCCN} 2018, Hangzhou, China, July 30 - August 2, 2018},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCCN.2018.8487432},
  doi          = {10.1109/ICCCN.2018.8487432},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/AdebayoRN018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/UchibayashiASH18,
  author       = {Toshihiro Uchibayashi and
                  Bernady O. Apduhan and
                  Takuo Suganuma and
                  Masahiro Hiji},
  editor       = {Osvaldo Gervasi and
                  Beniamino Murgante and
                  Sanjay Misra and
                  Elena N. Stankova and
                  Carmelo Maria Torre and
                  Ana Maria A. C. Rocha and
                  David Taniar and
                  Bernady O. Apduhan and
                  Eufemia Tarantino and
                  Yeonseung Ryu},
  title        = {Toward a Secure {VM} Migration Control Mechanism Using Blockchain
                  Technique for Cloud Computing Environment},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2018 - 18th International
                  Conference, Melbourne, VIC, Australia, July 2-5, 2018, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10962},
  pages        = {177--186},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95168-3\_12},
  doi          = {10.1007/978-3-319-95168-3\_12},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/UchibayashiASH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icl/El-SofanyEF18,
  author       = {Hosam F. El{-}Sofany and
                  Samir Abou El{-}Seoud and
                  Rahma Tallah H. Farouk},
  editor       = {Michael E. Auer and
                  Thrasyvoulos Tsiatsos},
  title        = {Studying the Effect of Using E-Learning Through Secure Cloud Computing
                  Systems},
  booktitle    = {The Challenges of the Digital Transformation in Education - Proceedings
                  of the 21st International Conference on Interactive Collaborative
                  Learning {(ICL} 2018) - Volume 2, Kos Island, Greece, 25-28 September
                  2018},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {917},
  pages        = {54--63},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-11935-5\_6},
  doi          = {10.1007/978-3-030-11935-5\_6},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icl/El-SofanyEF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/Das18,
  author       = {Debasis Das},
  title        = {Secure cloud computing algorithm using homomorphic encryption and
                  multi-party computation},
  booktitle    = {2018 International Conference on Information Networking, {ICOIN} 2018,
                  Chiang Mai, Thailand, January 10-12, 2018},
  pages        = {391--396},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICOIN.2018.8343147},
  doi          = {10.1109/ICOIN.2018.8343147},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icoin/Das18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icoin/HammamiBY18,
  author       = {Hamza Hammami and
                  Hanen Brahmi and
                  Sadok Ben Yahia},
  title        = {Secured outsourcing towards a cloud computing environment based on
                  {DNA} cryptography},
  booktitle    = {2018 International Conference on Information Networking, {ICOIN} 2018,
                  Chiang Mai, Thailand, January 10-12, 2018},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICOIN.2018.8343079},
  doi          = {10.1109/ICOIN.2018.8343079},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoin/HammamiBY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/YuRA18,
  author       = {Qian Yu and
                  Netanel Raviv and
                  Amir Salman Avestimehr},
  title        = {Coding for Private and Secure Multiparty Computing},
  booktitle    = {{IEEE} Information Theory Workshop, {ITW} 2018, Guangzhou, China,
                  November 25-29, 2018},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ITW.2018.8613443},
  doi          = {10.1109/ITW.2018.8613443},
  timestamp    = {Wed, 21 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/YuRA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/new2an/Davydov18,
  author       = {Viacheslav Davydov},
  editor       = {Olga Galinina and
                  Sergey Andreev and
                  Sergey I. Balandin and
                  Yevgeni Koucheryavy},
  title        = {System for Secure Computing Based on Homomorphism with Reduced Polynomial
                  Power},
  booktitle    = {Internet of Things, Smart Spaces, and Next Generation Networks and
                  Systems - 18th International Conference, {NEW2AN} 2018, and 11th Conference,
                  ruSMART 2018, St. Petersburg, Russia, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11118},
  pages        = {312--317},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01168-0\_29},
  doi          = {10.1007/978-3-030-01168-0\_29},
  timestamp    = {Mon, 16 Sep 2019 15:31:29 +0200},
  biburl       = {https://dblp.org/rec/conf/new2an/Davydov18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/IslamFH18,
  author       = {Torikul Islam and
                  Jannatul Ferdush and
                  M. M. A. Hashem},
  title        = {Secured Cloud Computing Outsourcing: {A} Case Study of Constrained
                  Linear Least Square Problem},
  booktitle    = {5th International Conference on Networking, Systems and Security,
                  NSysS 2018, Dhaka, Bangladesh, December 18-20, 2018},
  pages        = {141--145},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/NSysS.2018.8631378},
  doi          = {10.1109/NSYSS.2018.8631378},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/IslamFH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/BhadauriaC18,
  author       = {Rishabh Bhadauria and
                  Ashish Choudhury},
  editor       = {Calvin Newport and
                  Idit Keidar},
  title        = {Brief Announcement: Asynchronous Secure Distributed Computing with
                  Transferrable Non-equivocation Revisited},
  booktitle    = {Proceedings of the 2018 {ACM} Symposium on Principles of Distributed
                  Computing, {PODC} 2018, Egham, United Kingdom, July 23-27, 2018},
  pages        = {265--267},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://dl.acm.org/citation.cfm?id=3212777},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/BhadauriaC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/Scheideler18,
  author       = {Christian Scheideler},
  editor       = {Posco Tso and
                  Amitabh Trehan and
                  Iain Phillips and
                  Lin Cui},
  title        = {Relays: Towards a Link Layer for Robust and Secure Fog Computing},
  booktitle    = {Proceedings of the 2018 Workshop on Theory and Practice for Integrated
                  Cloud, Fog and Edge Computing Paradigms, TOPIC@PODC 2018, Egham, United
                  Kingdom, July 27, 2018},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3229774.3229781},
  doi          = {10.1145/3229774.3229781},
  timestamp    = {Wed, 27 Apr 2022 08:14:27 +0200},
  biburl       = {https://dblp.org/rec/conf/podc/Scheideler18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/Tang18,
  author       = {Xuan Tang},
  title        = {Best Practice for Developing Secure and Trusted Enterprise Storage
                  {\&} Computing Products},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {142},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00038},
  doi          = {10.1109/SECDEV.2018.00038},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/Tang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/LuoHX18,
  author       = {Shiyu Luo and
                  Zhichao Hua and
                  Yubin Xia},
  title        = {{TZ-KMS:} {A} Secure Key Management Service for Joint Cloud Computing
                  with {ARM} TrustZone},
  booktitle    = {{IEEE} Symposium on Service-Oriented System Engineering, {SOSE} 2018,
                  Bamberg, Germany, March 26-29, 2018},
  pages        = {180--185},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SOSE.2018.00030},
  doi          = {10.1109/SOSE.2018.00030},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/LuoHX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/ArifW0P18,
  author       = {Muhammad Arif and
                  Guojun Wang and
                  Tian Wang and
                  Tao Peng},
  editor       = {Guojun Wang and
                  Jinjun Chen and
                  Laurence T. Yang},
  title        = {SDN-Based Secure VANETs Communication with Fog Computing},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 11th International Conference and Satellite Workshops, SpaCCS
                  2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11342},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05345-1\_4},
  doi          = {10.1007/978-3-030-05345-1\_4},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/ArifW0P18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuPXWPW18,
  author       = {Qin Liu and
                  Shuyu Pei and
                  Kang Xie and
                  Jie Wu and
                  Tao Peng and
                  Guojun Wang},
  title        = {Achieving Secure and Effective Search Services in Cloud Computing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1386--1391},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00192},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00192},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuPXWPW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/BuzachisV18,
  author       = {Alina Buzachis and
                  Massimo Villari},
  editor       = {Alan Sill and
                  Josef Spillner},
  title        = {Basic Principles of Osmotic Computing: Secure and Dependable MicroElements
                  (MELs) Orchestration Leveraging Blockchain Facilities},
  booktitle    = {2018 {IEEE/ACM} International Conference on Utility and Cloud Computing
                  Companion, {UCC} Companion 2018, Zurich, Switzerland, December 17-20,
                  2018},
  pages        = {47--52},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/UCC-Companion.2018.00033},
  doi          = {10.1109/UCC-COMPANION.2018.00033},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ucc/BuzachisV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/ShaoZJ18,
  author       = {Jiaye Shao and
                  Yanqin Zhu and
                  Qijin Ji},
  editor       = {Guojun Wang and
                  Qi Han and
                  Md. Zakirul Alam Bhuiyan and
                  Xiaoxing Ma and
                  Fr{\'{e}}d{\'{e}}ric Loulergue and
                  Peng Li and
                  Manuel Roveri and
                  Lei Chen},
  title        = {Secure Online/Offline Multi-Authority Attribute-Based Encryption for
                  Resource-Constrained Devices in Cloud Computing},
  booktitle    = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou,
                  China, October 8-12, 2018},
  pages        = {642--649},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartWorld.2018.00129},
  doi          = {10.1109/SMARTWORLD.2018.00129},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/ShaoZJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/ZhaoWLWWZC18,
  author       = {Ruimin Zhao and
                  Jin Wang and
                  Kejie Lu and
                  Jianping Wang and
                  Xiumin Wang and
                  Jingya Zhou and
                  Chunming Cao},
  editor       = {Guojun Wang and
                  Qi Han and
                  Md. Zakirul Alam Bhuiyan and
                  Xiaoxing Ma and
                  Fr{\'{e}}d{\'{e}}ric Loulergue and
                  Peng Li and
                  Manuel Roveri and
                  Lei Chen},
  title        = {Weakly Secure Coded Distributed Computing},
  booktitle    = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou,
                  China, October 8-12, 2018},
  pages        = {603--610},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartWorld.2018.00124},
  doi          = {10.1109/SMARTWORLD.2018.00124},
  timestamp    = {Sat, 30 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/ZhaoWLWWZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/MeghanathanT18,
  author       = {Natarajan Meghanathan and
                  Michael Terrell},
  editor       = {Kevin Daimi},
  title        = {Design of a Secure Framework for Session Mobility as a Service in
                  Cloud Computing Environment},
  booktitle    = {Computer and Network Security Essentials},
  pages        = {475--490},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-58424-9\_27},
  doi          = {10.1007/978-3-319-58424-9\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/18/MeghanathanT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/18/SpanakiS18,
  author       = {Polyxeni Spanaki and
                  Nicolas Sklavos},
  editor       = {Kevin Daimi},
  title        = {Cloud Computing: Security Issues and Establishing Virtual Cloud Environment
                  via Vagrant to Secure Cloud Hosts},
  booktitle    = {Computer and Network Security Essentials},
  pages        = {539--553},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-58424-9\_31},
  doi          = {10.1007/978-3-319-58424-9\_31},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/18/SpanakiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2018,
  title        = {2018 {IEEE} 16th Intl Conf on Dependable, Autonomic and Secure Computing,
                  16th Intl Conf on Pervasive Intelligence and Computing, 4th Intl Conf
                  on Big Data Intelligence and Computing and Cyber Science and Technology
                  Congress, DASC/PiCom/DataCom/CyberSciTech 2018, Athens, Greece, August
                  12-15, 2018},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8511011/proceeding},
  isbn         = {978-1-5386-7518-2},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dasc/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/desec/2018,
  title        = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2018,
                  Kaohsiung, Taiwan, December 10-13, 2018},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8614461/proceeding},
  isbn         = {978-1-5386-5790-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-02685,
  author       = {Ehab Zaghloul and
                  Kai Zhou and
                  Jian Ren},
  title        = {{P-MOD:} Secure Privilege-Based Multilevel Organizational Data-Sharing
                  in Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1801.02685},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.02685},
  eprinttype    = {arXiv},
  eprint       = {1801.02685},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-02685.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-02640,
  author       = {Rawad Bitar and
                  Parimal Parag and
                  Salim El Rouayheb},
  title        = {Minimizing Latency for Secure Coded Computing Using Secret Sharing
                  via Staircase Codes},
  journal      = {CoRR},
  volume       = {abs/1802.02640},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.02640},
  eprinttype    = {arXiv},
  eprint       = {1802.02640},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-02640.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-08984,
  author       = {Kalev Alpernas and
                  Cormac Flanagan and
                  Sadjad Fouladi and
                  Leonid Ryzhyk and
                  Mooly Sagiv and
                  Thomas Schmitz and
                  Keith Winstein},
  title        = {Secure Serverless Computing Using Dynamic Information Flow Control},
  journal      = {CoRR},
  volume       = {abs/1802.08984},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.08984},
  eprinttype    = {arXiv},
  eprint       = {1802.08984},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-08984.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-03591,
  author       = {Bingcong Li and
                  Tianyi Chen and
                  Georgios B. Giannakis},
  title        = {Secure Mobile Edge Computing in IoT via Collaborative Online Learning},
  journal      = {CoRR},
  volume       = {abs/1805.03591},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.03591},
  eprinttype    = {arXiv},
  eprint       = {1805.03591},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-03591.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-05528,
  author       = {Zakaria Elmrabet and
                  Hamid El Ghazi and
                  Tayeb Sadiki and
                  Hassan El Ghazi},
  title        = {A New Secure Network Architecture to Increase Security Among Virtual
                  Machines in Cloud Computing},
  journal      = {CoRR},
  volume       = {abs/1809.05528},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.05528},
  eprinttype    = {arXiv},
  eprint       = {1809.05528},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-05528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Sinha17,
  author       = {Rohit Sinha},
  title        = {Secure Computing using Certified Software and Trusted Hardware},
  school       = {University of California, Berkeley, {USA}},
  year         = {2017},
  url          = {http://www.escholarship.org/uc/item/54r176n5},
  timestamp    = {Fri, 20 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Sinha17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYKZ17,
  author       = {Xumin Huang and
                  Rong Yu and
                  Jiawen Kang and
                  Yan Zhang},
  title        = {Distributed Reputation Management for Secure and Efficient Vehicular
                  Edge Computing and Networks},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {25408--25420},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2769878},
  doi          = {10.1109/ACCESS.2017.2769878},
  timestamp    = {Fri, 28 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYKZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuangYW17,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Licheng Wang},
  title        = {Secure Data Access Control With Ciphertext Update and Computation
                  Outsourcing in Fog Computing for Internet of Things},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {12941--12950},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2727054},
  doi          = {10.1109/ACCESS.2017.2727054},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/HuangYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RahmanHH17,
  author       = {Mohamed Abdur Rahman and
                  Elham Hassanain and
                  M. Shamim Hossain},
  title        = {Towards a Secure Mobile Edge Computing Framework for Hajj},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {11768--11781},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2716782},
  doi          = {10.1109/ACCESS.2017.2716782},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/RahmanHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RoyCDCKV17,
  author       = {Sandip Roy and
                  Santanu Chatterjee and
                  Ashok Kumar Das and
                  Samiran Chattopadhyay and
                  Neeraj Kumar and
                  Athanasios V. Vasilakos},
  title        = {On the Design of Provably Secure Lightweight Remote User Authentication
                  Scheme for Mobile Cloud Computing Services},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {25808--25825},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2764913},
  doi          = {10.1109/ACCESS.2017.2764913},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RoyCDCKV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SoleymaniAZAVKG17,
  author       = {Seyed Ahmad Soleymani and
                  Abdul Hanan Abdullah and
                  Mahdi Zareei and
                  Mohammad Hossein Anisi and
                  C{\'{e}}sar Vargas Rosales and
                  Muhammad Khurram Khan and
                  Shidrokh Goudarzi},
  title        = {A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks
                  With Fog Computing},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {15619--15629},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2733225},
  doi          = {10.1109/ACCESS.2017.2733225},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SoleymaniAZAVKG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZahraAJWJMK17,
  author       = {Samman Zahra and
                  Masoom Alam and
                  Qaisar Javaid and
                  Abdul Wahid and
                  Nadeem Javaid and
                  Saif Ur Rehman Malik and
                  Muhammad Khurram Khan},
  title        = {Fog Computing Over IoT: {A} Secure Deployment and Formal Verification},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {27132--27144},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2766180},
  doi          = {10.1109/ACCESS.2017.2766180},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZahraAJWJMK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/AminISSL17,
  author       = {Rooh ul Amin and
                  Irum Inayat and
                  Basit Shahzad and
                  Kashif Saleem and
                  AiJun Li},
  title        = {An empirical study on acceptance of secure healthcare service in Malaysia,
                  Pakistan, and Saudi Arabia: a mobile cloud computing perspective},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {72},
  number       = {5-6},
  pages        = {253--264},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12243-016-0553-4},
  doi          = {10.1007/S12243-016-0553-4},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/AminISSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/JararwehATDS17,
  author       = {Yaser Jararweh and
                  Mahmoud Al{-}Ayyoub and
                  Lo'ai Tawalbeh and
                  Ala Darabseh and
                  Houbing Song},
  title        = {Software-defined systems support for secure cloud computing based
                  on data classification},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {72},
  number       = {5-6},
  pages        = {335--345},
  year         = {2017},
  url          = {https://doi.org/10.1007/s12243-016-0549-0},
  doi          = {10.1007/S12243-016-0549-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/JararwehATDS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiuWLPW17,
  author       = {Qin Liu and
                  Guojun Wang and
                  Xuhui Liu and
                  Tao Peng and
                  Jie Wu},
  title        = {Achieving reliable and secure services in cloud computing environments},
  journal      = {Comput. Electr. Eng.},
  volume       = {59},
  pages        = {153--164},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.compeleceng.2016.10.005},
  doi          = {10.1016/J.COMPELECENG.2016.10.005},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/LiuWLPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ArvindM17,
  author       = {K. S. Arvind and
                  R. Manimegalai},
  title        = {Secure data classification using superior naive classifier in agent
                  based mobile cloud computing},
  journal      = {Clust. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1535--1542},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10586-017-0797-4},
  doi          = {10.1007/S10586-017-0797-4},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ArvindM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/GaiQH17,
  author       = {Keke Gai and
                  Meikang Qiu and
                  Houcine Hassan},
  title        = {Secure cyber incident analytics framework using Monte Carlo simulations
                  for financial cybersecurity insurance in cloud computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {7},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3856},
  doi          = {10.1002/CPE.3856},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/GaiQH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/NamasudraR17,
  author       = {Suyel Namasudra and
                  Pinki Roy},
  title        = {A new secure authentication scheme for cloud computing environment},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {20},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3864},
  doi          = {10.1002/CPE.3864},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/NamasudraR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/QinSWZXQ17,
  author       = {Zhen Qin and
                  Jianfei Sun and
                  Abubaker Wahaballa and
                  Wentao Zheng and
                  Hu Xiong and
                  Zhiguang Qin},
  title        = {A secure and privacy-preserving mobile wallet with outsourced verification
                  in cloud computing},
  journal      = {Comput. Stand. Interfaces},
  volume       = {54},
  pages        = {55--60},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.csi.2016.11.012},
  doi          = {10.1016/J.CSI.2016.11.012},
  timestamp    = {Thu, 02 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/QinSWZXQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eis/SareenGS17,
  author       = {Sanjay Sareen and
                  Sunil Kumar Gupta and
                  Sandeep K. Sood},
  title        = {An intelligent and secure system for predicting and preventing Zika
                  virus outbreak using Fog computing},
  journal      = {Enterp. Inf. Syst.},
  volume       = {11},
  number       = {9},
  pages        = {1436--1456},
  year         = {2017},
  url          = {https://doi.org/10.1080/17517575.2016.1277558},
  doi          = {10.1080/17517575.2016.1277558},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eis/SareenGS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/CastiglioneDSR17,
  author       = {Arcangelo Castiglione and
                  Paolo D'Arco and
                  Alfredo De Santis and
                  Rosario Russo},
  title        = {Secure group communication schemes for dynamic heterogeneous distributed
                  computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {74},
  pages        = {313--324},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2015.11.026},
  doi          = {10.1016/J.FUTURE.2015.11.026},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/CastiglioneDSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HuangYS17,
  author       = {Qinlong Huang and
                  Yixian Yang and
                  Mansuo Shen},
  title        = {Secure and efficient data collaboration with hierarchical attribute-based
                  encryption in cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {72},
  pages        = {239--249},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.09.021},
  doi          = {10.1016/J.FUTURE.2016.09.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HuangYS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/NamasudraRVAB17,
  author       = {Suyel Namasudra and
                  Pinki Roy and
                  Pandi Vijayakumar and
                  Sivaraman Audithan and
                  Balamurugan Balusamy},
  title        = {Time efficient secure {DNA} based access control model for cloud computing
                  environment},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {73},
  pages        = {90--105},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2017.01.017},
  doi          = {10.1016/J.FUTURE.2017.01.017},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/NamasudraRVAB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/OdeluDKHW17,
  author       = {Vanga Odelu and
                  Ashok Kumar Das and
                  Saru Kumari and
                  Xinyi Huang and
                  Mohammad Wazid},
  title        = {Provably secure authenticated key agreement scheme for distributed
                  mobile cloud computing services},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {68},
  pages        = {74--88},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.09.009},
  doi          = {10.1016/J.FUTURE.2016.09.009},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/OdeluDKHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/Rao17,
  author       = {Y. Sreenivasa Rao},
  title        = {A secure and efficient Ciphertext-Policy Attribute-Based Signcryption
                  for Personal Health Records sharing in cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {67},
  pages        = {133--151},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.07.019},
  doi          = {10.1016/J.FUTURE.2016.07.019},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/Rao17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WuZCH17,
  author       = {Libing Wu and
                  Yubo Zhang and
                  Kim{-}Kwang Raymond Choo and
                  Debiao He},
  title        = {Efficient and secure identity-based encryption scheme with equality
                  test in cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {73},
  pages        = {22--31},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2017.03.007},
  doi          = {10.1016/J.FUTURE.2017.03.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WuZCH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnds/KimL17,
  author       = {Hyun{-}Jin Kim and
                  Im{-}Yeong Lee},
  title        = {A study on a secure single sign-on for user authentication information
                  privacy in distributed computing environment},
  journal      = {Int. J. Commun. Networks Distributed Syst.},
  volume       = {19},
  number       = {1},
  pages        = {28--45},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJCNDS.2017.10002332},
  doi          = {10.1504/IJCNDS.2017.10002332},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnds/KimL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/LiuWYJL17,
  author       = {Meng Liu and
                  Xuan Wang and
                  Chi Yang and
                  Zoe Lin Jiang and
                  Ye Li},
  title        = {An efficient secure Internet of things data storage auditing protocol
                  with adjustable parameter in cloud computing},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {13},
  number       = {1},
  year         = {2017},
  url          = {https://doi.org/10.1177/1550147716686579},
  doi          = {10.1177/1550147716686579},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/LiuWYJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijfcs/MaLO17,
  author       = {Chunguang Ma and
                  Juyan Li and
                  Weiping Ouyang},
  title        = {Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption
                  for Secure Big Data Computing in Cloud Environment},
  journal      = {Int. J. Found. Comput. Sci.},
  volume       = {28},
  number       = {6},
  pages        = {645--660},
  year         = {2017},
  url          = {https://doi.org/10.1142/S0129054117400111},
  doi          = {10.1142/S0129054117400111},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijfcs/MaLO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/TawalbehAJA17,
  author       = {Lo'ai Ali Tawalbeh and
                  Fadi Ababneh and
                  Yaser Jararweh and
                  Fahd M. Al{-}Dosari},
  title        = {Trust delegation-based secure mobile cloud computing framework},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {36--48},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJICS.2017.10003598},
  doi          = {10.1504/IJICS.2017.10003598},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/TawalbehAJA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitwe/He17,
  author       = {Yan He},
  title        = {Study on Secure Dynamic Covering Algorithm for E-Logistics Information
                  in a Cloud Computing Platform},
  journal      = {Int. J. Inf. Technol. Web Eng.},
  volume       = {12},
  number       = {4},
  pages        = {42--55},
  year         = {2017},
  url          = {https://doi.org/10.4018/IJITWE.2017100103},
  doi          = {10.4018/IJITWE.2017100103},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitwe/He17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/BalusamyKAC17,
  author       = {Balamurugan Balusamy and
                  P. Venkata Krishna and
                  G. S. Tamizh Arasi and
                  Victor Chang},
  title        = {A Secured Access Control Technique for Cloud Computing Environment
                  Using Attribute Based Hierarchical Structure and Token Granting System},
  journal      = {Int. J. Netw. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {559--572},
  year         = {2017},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v19-n4/ijns-2017-v19-n4-p559-572.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/BalusamyKAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwgs/WangCLKK17,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Jin Li and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  title        = {TrDup: enhancing secure data deduplication with user traceability
                  in cloud computing},
  journal      = {Int. J. Web Grid Serv.},
  volume       = {13},
  number       = {3},
  pages        = {270--289},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJWGS.2017.10006054},
  doi          = {10.1504/IJWGS.2017.10006054},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwgs/WangCLKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiGQQZ17,
  author       = {Yibin Li and
                  Keke Gai and
                  Longfei Qiu and
                  Meikang Qiu and
                  Hui Zhao},
  title        = {Intelligent cryptography approach for secure distributed big data
                  storage in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {387},
  pages        = {103--115},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.09.005},
  doi          = {10.1016/J.INS.2016.09.005},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiGQQZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/DongRZ17,
  author       = {Min Dong and
                  Yanli Ren and
                  Xinpeng Zhang},
  title        = {Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing
                  in Cloud Computing},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {7},
  pages        = {3648--3663},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.07.019},
  doi          = {10.3837/TIIS.2017.07.019},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/DongRZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/YinQOL17,
  author       = {Hui Yin and
                  Zheng Qin and
                  Lu Ou and
                  Keqin Li},
  title        = {A query privacy-enhanced and secure search scheme over encrypted data
                  in cloud computing},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {90},
  pages        = {14--27},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jcss.2016.12.003},
  doi          = {10.1016/J.JCSS.2016.12.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/YinQOL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/SekharRV17,
  author       = {B. V. D. S. Sekhar and
                  P. V. G. D. Prasad Reddy and
                  G. P. Saradhi Varma},
  title        = {Performance of Secured and Robust Watermarking Using Evolutionary
                  Computing Technique},
  journal      = {J. Glob. Inf. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {61--79},
  year         = {2017},
  url          = {https://doi.org/10.4018/JGIM.2017100105},
  doi          = {10.4018/JGIM.2017100105},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jgim/SekharRV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/RathodR17,
  author       = {Suresh B. Rathod and
                  Vuyyuru Krishna Reddy},
  title        = {NDynamic Framework for Secure {VM} Migration over Cloud Computing},
  journal      = {J. Inf. Process. Syst.},
  volume       = {13},
  number       = {3},
  pages        = {476--490},
  year         = {2017},
  url          = {https://doi.org/10.3745/JIPS.01.0015},
  doi          = {10.3745/JIPS.01.0015},
  timestamp    = {Sat, 20 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jips/RathodR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/MondalM17,
  author       = {Bhaskar Mondal and
                  Tarni Mandal},
  title        = {A light weight secure image encryption scheme based on chaos {\&}
                  {DNA} computing},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {29},
  number       = {4},
  pages        = {499--504},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jksuci.2016.02.003},
  doi          = {10.1016/J.JKSUCI.2016.02.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/MondalM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/HuCFW17,
  author       = {Jin{-}Xin Hu and
                  Chin{-}Ling Chen and
                  Chun{-}Long Fan and
                  Kun{-}hao Wang},
  title        = {An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor
                  Based on Cloud Computing},
  journal      = {J. Sensors},
  volume       = {2017},
  pages        = {3734764:1--3734764:11},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/3734764},
  doi          = {10.1155/2017/3734764},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/HuCFW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/KimKP17,
  author       = {Hyungjoo Kim and
                  Jungho Kang and
                  Jong Hyuk Park},
  title        = {A light-weight secure information transmission and device control
                  scheme in integration of {CPS} and cloud computing},
  journal      = {Microprocess. Microsystems},
  volume       = {52},
  pages        = {416--426},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.micpro.2016.08.001},
  doi          = {10.1016/J.MICPRO.2016.08.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mam/KimKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/StergiouP17,
  author       = {Christos Stergiou and
                  Kostas E. Psannis},
  title        = {Efficient and secure {BIG} data delivery in Cloud Computing},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {21},
  pages        = {22803--22822},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-017-4590-4},
  doi          = {10.1007/S11042-017-4590-4},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/StergiouP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scpe/SharmaBBS17,
  author       = {Kavita Sharma and
                  Suman Bala and
                  Himani Bansal and
                  Gulshan Shrivastava},
  title        = {Introduction to the Special Issue on Secure Solutions for Network
                  in Scalable Computing},
  journal      = {Scalable Comput. Pract. Exp.},
  volume       = {18},
  number       = {3},
  pages        = {iii--iv},
  year         = {2017},
  url          = {https://doi.org/10.12694/scpe.v18i3.1299},
  doi          = {10.12694/SCPE.V18I3.1299},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scpe/SharmaBBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FanWWLY17,
  author       = {Kai Fan and
                  Junxiong Wang and
                  Xin Wang and
                  Hui Li and
                  Yintang Yang},
  title        = {A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud
                  Computing},
  journal      = {Sensors},
  volume       = {17},
  number       = {7},
  pages        = {1695},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17071695},
  doi          = {10.3390/S17071695},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/FanWWLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WuHYLA17,
  author       = {Wei Wu and
                  Shun Hu and
                  Xu Yang and
                  Joseph K. Liu and
                  Man Ho Au},
  title        = {Towards secure and cost-effective fuzzy access control in mobile cloud
                  computing},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {10},
  pages        = {2643--2649},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-015-1964-2},
  doi          = {10.1007/S00500-015-1964-2},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/WuHYLA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZouWYSC17,
  author       = {Qin Zou and
                  Jianfeng Wang and
                  Jun Ye and
                  Jian Shen and
                  Xiaofeng Chen},
  title        = {Efficient and secure encrypted image search in mobile cloud computing},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {11},
  pages        = {2959--2969},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2153-7},
  doi          = {10.1007/S00500-016-2153-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ZouWYSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/LiuMWCHX17,
  author       = {Jianghua Liu and
                  Jinhua Ma and
                  Wei Wu and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Li Xu},
  title        = {Protecting Mobile Health Records in Cloud Computing: {A} Secure, Efficient,
                  and Anonymous Design},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {57:1--57:20},
  year         = {2017},
  url          = {https://doi.org/10.1145/2983625},
  doi          = {10.1145/2983625},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/LiuMWCHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/MathewCP17,
  author       = {Jimson Mathew and
                  Rajat Subhra Chakraborty and
                  Dhiraj K. Pradhan},
  title        = {Guest Editorial: Special Issue on "Secure and Fault-Tolerant Embedded
                  Computing"},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {16},
  number       = {4},
  pages        = {92:1--92:2},
  year         = {2017},
  url          = {https://doi.org/10.1145/3075563},
  doi          = {10.1145/3075563},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/MathewCP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouAR17,
  author       = {Kai Zhou and
                  M. H. Afifi and
                  Jian Ren},
  title        = {ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations
                  for Mobile Cloud Computing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2518--2531},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2710941},
  doi          = {10.1109/TIFS.2017.2710941},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhouAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}