Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             34 results found
no title author magazine year volume issue page(s) type
1 A foggy research future: Advances and future opportunities in fog computing research Choo, Kim-Kwang Raymond
2018
78 P2 p. 677-679
article
2 An efficient access control scheme with outsourcing capability and attribute update for fog computing Zhang, Peng
2018
78 P2 p. 753-762
article
3 An integrated information lifecycle management framework for exploiting social network data to identify dynamic large crowd concentration events in smart cities applications Kousiouris, George
2018
78 P2 p. 516-530
article
4 Anonymous and secure aggregation scheme in fog-based public cloud computing Wang, Huaqun
2018
78 P2 p. 712-719
article
5 An SVM-based collaborative filtering approach for Top-N web services recommendation Ren, Lifang
2018
78 P2 p. 531-543
article
6 A reliable IoT system for Personal Healthcare Devices Woo, Min Woo
2018
78 P2 p. 626-640
article
7 A variant of password authenticated key exchange protocol Zhang, Yuexin
2018
78 P2 p. 699-711
article
8 Bitcoin-based fair payments for outsourcing computations of fog devices Huang, Hui
2018
78 P2 p. 850-858
article
9 CCA-secure ABE with outsourced decryption for fog computing Zuo, Cong
2018
78 P2 p. 730-738
article
10 Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing Jiang, Yinhao
2018
78 P2 p. 720-729
article
11 Controlling and filtering users data in Intelligent Transportation System Gosman, Catalin
2018
78 P2 p. 807-816
article
12 CUIDATS: An RFID–WSN hybrid monitoring system for smart health care environments Adame, Toni
2018
78 P2 p. 602-615
article
13 Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT + OSINT): A timely and cohesive mix Quick, Darren
2018
78 P2 p. 558-567
article
14 Editorial Board 2018
78 P2 p. IFC
article
15 Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach Rahmani, Amir M.
2018
78 P2 p. 641-658
article
16 Exploring the relationship between architectures and management policies in the design of NUCA-based chip multicore systems Bartolini, Sandro
2018
78 P2 p. 481-501
article
17 Hybrid privacy-preserving clinical decision support system in fog–cloud computing Liu, Ximeng
2018
78 P2 p. 825-837
article
18 Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics Firouzi, Farshad
2018
78 P2 p. 583-586
article
19 Internet of Things security and forensics: Challenges and opportunities Conti, Mauro
2018
78 P2 p. 544-546
article
20 Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges Roman, Rodrigo
2018
78 P2 p. 680-698
article
21 Position based cryptography with location privacy: A step for Fog Computing Yang, Rupeng
2018
78 P2 p. 799-806
article
22 Power transmission and workload balancing policies in eHealth mobile cloud computing scenarios Pagán, Josué
2018
78 P2 p. 587-601
article
23 Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities Chen, Bo-Wei
2018
78 P2 p. 859-866
article
24 Privacy preserving cloud data auditing with efficient key update Li, Yannan
2018
78 P2 p. 789-798
article
25 Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing Koo, Dongyoung
2018
78 P2 p. 739-752
article
26 Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems Tonyali, Samet
2018
78 P2 p. 547-557
article
27 Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities Ge, Mengmeng
2018
78 P2 p. 568-582
article
28 Scalable parallel simulation of dynamical processes on large stochastic Kronecker graphs Bochenina, Klavdiya
2018
78 P2 p. 502-515
article
29 Secure intelligent traffic light control using fog computing Liu, Jian
2018
78 P2 p. 817-824
article
30 Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare Farahani, Bahar
2018
78 P2 p. 659-676
article
31 Towards leakage-resilient fine-grained access control in fog computing Yu, Zuoxia
2018
78 P2 p. 763-777
article
32 Universal and secure object ownership transfer protocol for the Internet of Things Ray, Biplob R.
2018
78 P2 p. 838-849
article
33 Unobtrusive detection of body movements during sleep using Wi-Fi received signal strength with model adaptation technique Ammae, Osamu
2018
78 P2 p. 616-625
article
34 Verifiable searchable encryption with aggregate keys for data sharing system Liu, Zheli
2018
78 P2 p. 778-788
article
                             34 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands