Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,120 Hits in 4.5 sec

Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones

Paolo Gasti, Jaroslav Sedenka, Qing Yang, Gang Zhou, Kiran S. Balagani
2016 IEEE Transactions on Information Forensics and Security  
Our approach is secure against a colluding smartphone and Cloud, thus making it well suited for authentication. We performed extensive experimental evaluation.  ...  Common smartphone authentication mechanisms (e.g., PINs, graphical passwords, and fingerprint scans) are not designed to offer security post-login.  ...  Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones I.  ... 
doi:10.1109/tifs.2016.2585093 fatcat:uz6scqj7tja3bewzn3v3jv5vuq

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens

Daniel Demmler, Thomas Schneider, Michael Zohner
2014 USENIX Security Symposium  
as fast as previous work on desktop computers.  ...  For private set intersection, our token-aided implementation on mobile phones is up to two orders of magnitude faster than previous generic secure two-party computation protocols on mobile phones and even  ...  Acknowledgements We thank the anonymous reviewers of USENIX Security 2014 for their helpful comments on our paper.  ... 
dblp:conf/uss/Demmler0Z14 fatcat:yhw7hk65fvgkhmi2csvcnw4vwm

Energy-efficient service-oriented architecture for mobile cloud handover

Qassim Bani Hani, Julius P. Dichter
2017 Journal of Cloud Computing: Advances, Systems and Applications  
These four layers collectively handle the energy-efficiency, security and QoS parameters.  ...  Here, we introduce a secure energy-efficient and quality-of-service architecture (EEQoSA) for the handover process in the mobile cloud computing environment.  ...  Acknowledgements We are also thankful to anonymous reviewers for their valuable feedback and comments for improving the quality of the manuscript.  ... 
doi:10.1186/s13677-017-0079-y fatcat:4tm2zmvcsbdbjmagdhwgffsysu

A Context Aware Mechanism for Mobile Devices to Efficiently Acquire Resources Remotely

Kashif Tasneem, Ayesha Siddiqui, Anum Liaquat
2019 International Journal of Computer Applications  
Computational and network intensive applications cannot run efficiently on mobile devices due to their limited batteries and energy deficient systems.  ...  Implementation of that algorithm is left for future work.  ...  Data Security: Outsourcing computation and data increases security risks. The cloud on which these items are hosted must be secure, reliable and should handle privacy very efficiently.  ... 
doi:10.5120/ijca2019918489 fatcat:ilgdxw4krbcydcsu7umegxgf4e

A Comprehensive Survey on Security and Privacy for Electronic Health Data

Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
2021 International Journal of Environmental Research and Public Health  
In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers.  ...  Based on the review, we obtained research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies  ...  [58] proposed a secure and energy-efficient e-health data transmission system based on chaotic CS, which is energy-efficient and also has an encryption performance for the medical networks.  ... 
doi:10.3390/ijerph18189668 pmid:34574593 fatcat:nx7rjvy7tfczjbgmmpqgyiajuu

REVIEW ON COMPUTE AUGMENTATION TECHNIQUES IN MOBILE CLOUD COMPUTING

V. Suganya
2018 International Journal of Advanced Research in Computer Science  
., [12] an avatar prototype has been built and executed on Android devices and Android x86 virtual machines to achieve the goals such as effective execution with fast, scalable, reliable and energy efficient  ...  In addition, it also augmented the security mechanism for securely outsourcing the offloaded data using steganography and encryption.  ... 
doi:10.26483/ijarcs.v9i2.5767 fatcat:cn7s5h3i3vatbbjfq2z7gnuqky

An Overview on Edge Computing Research

Keyan Cao, Yefan Liu, Gongjie Meng, Qimeng Sun
2020 IEEE Access  
Then summarize the architecture of edge computing, keyword technology, security and privacy protection, and finally summarize the applications of edge computing.  ...  At the edge of the network, it is lightweight for local, small-scale data storage and processing. This article mainly reviews the related research and results of edge computing.  ...  energy efficiency [33] .  ... 
doi:10.1109/access.2020.2991734 fatcat:6gt7kr44urdcfcq65w7m2anjku

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
., +, TPDS July 2014 1735-1744 New Algorithms for Secure Outsourcing of Modular Exponentiations.  ...  Wu, Yongwei, +, TPDS Jan. 2014 156-166 New Algorithms for Secure Outsourcing of Modular Exponentiations.  ...  ., +, TPDS June 2014 1533 -1542 Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

Identity in the age of social networks and digitalisation

Daniele Fiebig
2020 Central and Eastern European eDem and eGov Days  
For example, applications must be legally assignable to an applicant. In public administration, security, availability and authenticity play a major role alongside other security objectives.  ...  Considerations of efficient and secure user registration, recognition and transparent presentation of activities and transactions are desirable and necessary.  ...  User certificates must be installed on the hardware or in the software used for login (e.g. browser) to ensure a fast and secure login.  ... 
doi:10.24989/ocg.338.14 fatcat:b65anuz2zrfxdhqs46gbjsn52u

Service offloading of computationally intensive processes using Hadoop image processing interface in private cloud

L. K. Nandhini, S. Udhayakumar
2017 2016 Eighth International Conference on Advanced Computing (ICoAC)  
The growth of mobile applications due to the increasing popularity of smartphones and ubiquity of wireless access has fueled cloud computing to converge into mobile cloud.  ...  opportunity for mobile cloud computing.  ...  are energy efficient when migrated to cloud servers.  ... 
doi:10.1109/icoac.2017.7951770 fatcat:dqpkqazi7zg33itpowzrwksvee

Security requirements modelling for virtualized 5G small cell networks

Vassilios G. Vassilakis, Haralambos Mouratidis, Emmanouil Panaousis, Ioannis D. Moscholios, Michael D. Logothetis
2017 2017 24th International Conference on Telecommunications (ICT)  
Furthermore, we identify appropriate security constraints and suitable security mechanisms for 5G networks.  ...  Within the scope of the EU-funded research project SESAME we perform a comprehensive security modelling of MEC-assisted quality-of-experience (QoE) enhancement of fast moving users in a virtualized SC  ...  This research work is based upon the concept of the European research project SESAME (Small cEllS coordinAtion for Multi-tenancy and Edge services), and it has received funding under Grant Agreement No  ... 
doi:10.1109/ict.2017.7998269 dblp:conf/ict/VassilakisMPML17 fatcat:7jluxz7tsfennkvjzezuek2km4

The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective [article]

Behrouz Zolfaghari
2022 arXiv   pre-print
We proceed to highlight existing approaches towards the design of Secure CAIoT (SCAIoT) along with related security challenges and controls. We develop a layered architecture for SCAIoT.  ...  Although it is pertinent to study both technologies, this paper focuses on CAIoT, and especially its security issues, which are inherited from both Cloud computing and IoT.  ...  With considering Energy-Efficient works in this area, the authors in [211] propose a novel system energy consumption model that accounts for the runtime, switching, and computation energy consumption  ... 
arXiv:2207.01590v2 fatcat:2kznp4sj7resznpiylio3wfrsa

Design and Development of a Real Time Virtualized Cloud Based Mobile Phones Data Storage for Ethio Telecom

Eshete Derb Emiru, Walelign Tewabe Sewunetie
2016 IOSR Journal of Mobile Computing & Application  
With the advent of cloud services for mobile application, it has greatly enhanced the scalability and security.  ...  Mobile phone is one of the most widely and extensively used devices for communication across the world for both personal and business activities.  ...  mobile users with security services such as virus scanning, malicious code detection, and authentication [14] .  ... 
doi:10.9790/0050-03044751 fatcat:oocmj7arlfbqzezia45wp5mgi4

Multi-point Security by a Multiplatform-compatible Multifunctional Authentication and Encryption Board

2019 Journal of Computing and Information Technology  
It is applicable on application level for devices, including IoT based devices, sensors, Android, and iOS-based smartphones.  ...  The system incurs low overhead in time and energy by performing security operations in an ASIC coprocessor, and can be shared to secure access to multiple devices, which reduces both energy and cost.  ...  However, symmetric key cryptography is more efficient and fast, and for this reason, fast Advanced Encryption Standard (AES) encryption ensues.  ... 
doi:10.20532/cit.2018.1004174 fatcat:ich3rhw3ebbu3l3k2lf3mjfy34

CVEH: A Dynamic Framework To Profile Vehicle Movements To Mitigate Hit And Run Cases Using Crowdsourcing [article]

Attiq ur Rehman, Asad Waqar Malik, Anis ur Rahman, Sohail Iqbal, Ghalib Ahmed Tahir
2021 arXiv   pre-print
In developed countries like the USA, Germany, and the UK, the security forces used highly sophisticated equipment, fast vehicles, drones, and helicopters to catch offenders' vehicles.  ...  The CC centre projects the path and engages nearly located law enforcement agencies. CVEH is developed and evaluated on android smartphones.  ...  The authors proposed a four-layered architecture for smart cities to handle data coming from static and dynamic sensors to utilize energy efficiently. Similarly, Z. Ali et al.  ... 
arXiv:2107.04026v1 fatcat:def4e5kcazbhxkie7njetadft4
« Previous Showing results 1 — 15 out of 1,120 results