Search
Now showing items 41-50 of 83
IntegrityChain: Provable data possession for decentralized storage
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data ...
Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
With the widespread use of Android devices, research on their security has attracted increasing attention. However, at present, digital forensics for investigating attacks, such as social engineering attacks and phishing ...
Accountable credential management system for vehicular communication
(
Elsevier Inc.
, 2020 , Article)
Social Internet of Vehicles (SIoV) is becoming a reality where private and secure communication is a prerequisite. Various standardization organizations and studies have reached a consensus to use Vehicular Public-key ...
Blockchain-based privacy-preserving valet parking for self-driving vehicles
(
John Wiley and Sons Inc
, 2021 , Article)
The valet parking provides convenience for users and thus is becoming increasingly popular nowadays. However, this valet parking service incurs the risks of location information leakage and vehicle theft. To address these ...
A deep learning-based approach for fault diagnosis of current-carrying ring in catenary system
(
Springer Science and Business Media Deutschland GmbH
, 2021 , Article)
In the Industrial Internet of Things, the deep learning-based methods are used to help solve various problems. The current-carrying ring as one of important components on the catenary system which is always small in the ...
Malicious mining code detection based on ensemble learning in cloud computing environment
(
Elsevier B.V.
, 2021 , Article)
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ...
Pgride: Privacy-preserving group ridesharing matching in online ride hailing services
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
An online ride hailing (ORH) service creates a typical supply-and-demand two-sided market, which enables riders and drivers to establish optimized rides conveniently via mobile applications. Group ridesharing is a novel ...
An Energy Aware Offloading Scheme for Interdependent Applications in Software-Defined IoV with Fog Computing Architecture
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The Internet of Vehicles (IoV) is one important application scenarios for the development of the Internet of things. The software-defined network (SDN) and fog computing could effectively improve the IoV network dynamics, ...
Zero-Chain: A Blockchain-Based Identity for Digital City Operating System
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The challenges of population management as urban density increase globally have compelled researchers and developers to consider more efficient means of managing resources in cities. Consequently, the smart city concept ...
A Two-Tier Collection and Processing Scheme for Fog-Based Mobile Crowdsensing in the Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
In view of the rapid development of the Internet of Vehicles (IoV) and wireless communication technology, intelligent transportation systems play an important role in improving urban road safety, promoting the behavioral ...