A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones
2016
IEEE Transactions on Information Forensics and Security
Our approach is secure against a colluding smartphone and Cloud, thus making it well suited for authentication. We performed extensive experimental evaluation. ...
Common smartphone authentication mechanisms (e.g., PINs, graphical passwords, and fingerprint scans) are not designed to offer security post-login. ...
Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones I. ...
doi:10.1109/tifs.2016.2585093
fatcat:uz6scqj7tja3bewzn3v3jv5vuq
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
2014
USENIX Security Symposium
as fast as previous work on desktop computers. ...
For private set intersection, our token-aided implementation on mobile phones is up to two orders of magnitude faster than previous generic secure two-party computation protocols on mobile phones and even ...
Acknowledgements We thank the anonymous reviewers of USENIX Security 2014 for their helpful comments on our paper. ...
dblp:conf/uss/Demmler0Z14
fatcat:yhw7hk65fvgkhmi2csvcnw4vwm
Energy-efficient service-oriented architecture for mobile cloud handover
2017
Journal of Cloud Computing: Advances, Systems and Applications
These four layers collectively handle the energy-efficiency, security and QoS parameters. ...
Here, we introduce a secure energy-efficient and quality-of-service architecture (EEQoSA) for the handover process in the mobile cloud computing environment. ...
Acknowledgements We are also thankful to anonymous reviewers for their valuable feedback and comments for improving the quality of the manuscript. ...
doi:10.1186/s13677-017-0079-y
fatcat:4tm2zmvcsbdbjmagdhwgffsysu
A Context Aware Mechanism for Mobile Devices to Efficiently Acquire Resources Remotely
2019
International Journal of Computer Applications
Computational and network intensive applications cannot run efficiently on mobile devices due to their limited batteries and energy deficient systems. ...
Implementation of that algorithm is left for future work. ...
Data Security: Outsourcing computation and data increases security risks. The cloud on which these items are hosted must be secure, reliable and should handle privacy very efficiently. ...
doi:10.5120/ijca2019918489
fatcat:ilgdxw4krbcydcsu7umegxgf4e
A Comprehensive Survey on Security and Privacy for Electronic Health Data
2021
International Journal of Environmental Research and Public Health
In particular, edge and fog computing studies for e-health security and privacy were reviewed since the studies had mostly not been analyzed in other survey papers. ...
Based on the review, we obtained research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies ...
[58] proposed a secure and energy-efficient e-health data transmission system based on chaotic CS, which is energy-efficient and also has an encryption performance for the medical networks. ...
doi:10.3390/ijerph18189668
pmid:34574593
fatcat:nx7rjvy7tfczjbgmmpqgyiajuu
REVIEW ON COMPUTE AUGMENTATION TECHNIQUES IN MOBILE CLOUD COMPUTING
2018
International Journal of Advanced Research in Computer Science
., [12] an avatar prototype has been built and executed on Android devices and Android x86 virtual machines to achieve the goals such as effective execution with fast, scalable, reliable and energy efficient ...
In addition, it also augmented the security mechanism for securely outsourcing the offloaded data using steganography and encryption. ...
doi:10.26483/ijarcs.v9i2.5767
fatcat:cn7s5h3i3vatbbjfq2z7gnuqky
An Overview on Edge Computing Research
2020
IEEE Access
Then summarize the architecture of edge computing, keyword technology, security and privacy protection, and finally summarize the applications of edge computing. ...
At the edge of the network, it is lightweight for local, small-scale data storage and processing. This article mainly reviews the related research and results of edge computing. ...
energy efficiency [33] . ...
doi:10.1109/access.2020.2991734
fatcat:6gt7kr44urdcfcq65w7m2anjku
2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25
2015
IEEE Transactions on Parallel and Distributed Systems
., +, TPDS July 2014 1735-1744
New Algorithms for Secure Outsourcing of Modular Exponentiations. ...
Wu, Yongwei, +, TPDS Jan. 2014 156-166
New Algorithms for Secure Outsourcing of Modular Exponentiations. ...
., +, TPDS June 2014 1533 -1542 Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets. ...
doi:10.1109/tpds.2014.2371591
fatcat:qxyljogalrbfficryqjowgv3je
Identity in the age of social networks and digitalisation
2020
Central and Eastern European eDem and eGov Days
For example, applications must be legally assignable to an applicant. In public administration, security, availability and authenticity play a major role alongside other security objectives. ...
Considerations of efficient and secure user registration, recognition and transparent presentation of activities and transactions are desirable and necessary. ...
User certificates must be installed on the hardware or in the software used for login (e.g. browser) to ensure a fast and secure login. ...
doi:10.24989/ocg.338.14
fatcat:b65anuz2zrfxdhqs46gbjsn52u
Service offloading of computationally intensive processes using Hadoop image processing interface in private cloud
2017
2016 Eighth International Conference on Advanced Computing (ICoAC)
The growth of mobile applications due to the increasing popularity of smartphones and ubiquity of wireless access has fueled cloud computing to converge into mobile cloud. ...
opportunity for mobile cloud computing. ...
are energy efficient when migrated to cloud servers. ...
doi:10.1109/icoac.2017.7951770
fatcat:dqpkqazi7zg33itpowzrwksvee
Security requirements modelling for virtualized 5G small cell networks
2017
2017 24th International Conference on Telecommunications (ICT)
Furthermore, we identify appropriate security constraints and suitable security mechanisms for 5G networks. ...
Within the scope of the EU-funded research project SESAME we perform a comprehensive security modelling of MEC-assisted quality-of-experience (QoE) enhancement of fast moving users in a virtualized SC ...
This research work is based upon the concept of the European research project SESAME (Small cEllS coordinAtion for Multi-tenancy and Edge services), and it has received funding under Grant Agreement No ...
doi:10.1109/ict.2017.7998269
dblp:conf/ict/VassilakisMPML17
fatcat:7jluxz7tsfennkvjzezuek2km4
The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective
[article]
2022
arXiv
pre-print
We proceed to highlight existing approaches towards the design of Secure CAIoT (SCAIoT) along with related security challenges and controls. We develop a layered architecture for SCAIoT. ...
Although it is pertinent to study both technologies, this paper focuses on CAIoT, and especially its security issues, which are inherited from both Cloud computing and IoT. ...
With considering Energy-Efficient works in this area, the authors in [211] propose a novel system energy consumption model that accounts for the runtime, switching, and computation energy consumption ...
arXiv:2207.01590v2
fatcat:2kznp4sj7resznpiylio3wfrsa
Design and Development of a Real Time Virtualized Cloud Based Mobile Phones Data Storage for Ethio Telecom
2016
IOSR Journal of Mobile Computing & Application
With the advent of cloud services for mobile application, it has greatly enhanced the scalability and security. ...
Mobile phone is one of the most widely and extensively used devices for communication across the world for both personal and business activities. ...
mobile users with security services such as virus scanning, malicious code detection, and authentication [14] . ...
doi:10.9790/0050-03044751
fatcat:oocmj7arlfbqzezia45wp5mgi4
Multi-point Security by a Multiplatform-compatible Multifunctional Authentication and Encryption Board
2019
Journal of Computing and Information Technology
It is applicable on application level for devices, including IoT based devices, sensors, Android, and iOS-based smartphones. ...
The system incurs low overhead in time and energy by performing security operations in an ASIC coprocessor, and can be shared to secure access to multiple devices, which reduces both energy and cost. ...
However, symmetric key cryptography is more efficient and fast, and for this reason, fast Advanced Encryption Standard (AES) encryption ensues. ...
doi:10.20532/cit.2018.1004174
fatcat:ich3rhw3ebbu3l3k2lf3mjfy34
CVEH: A Dynamic Framework To Profile Vehicle Movements To Mitigate Hit And Run Cases Using Crowdsourcing
[article]
2021
arXiv
pre-print
In developed countries like the USA, Germany, and the UK, the security forces used highly sophisticated equipment, fast vehicles, drones, and helicopters to catch offenders' vehicles. ...
The CC centre projects the path and engages nearly located law enforcement agencies. CVEH is developed and evaluated on android smartphones. ...
The authors proposed a four-layered architecture for smart cities to handle data coming from static and dynamic sensors to utilize energy efficiently. Similarly, Z. Ali et al. ...
arXiv:2107.04026v1
fatcat:def4e5kcazbhxkie7njetadft4
« Previous
Showing results 1 — 15 out of 1,120 results