بحث بسيط
السجلات المعروضة 1 -- 9 من 9
An Energy Aware Offloading Scheme for Interdependent Applications in Software-Defined IoV with Fog Computing Architecture
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The Internet of Vehicles (IoV) is one important application scenarios for the development of the Internet of things. The software-defined network (SDN) and fog computing could effectively improve the IoV network dynamics, ...
A Blockchain-Based Storage System with Financial Incentives for Load-balancing
(
IEEE Computer Society
, 2021 , Article)
Most storage systems adopt distributed architecture to reach high reliability. In these distributed systems, a well-balanced data distribution can improve storage reliability. However, existing schemes rely on dealers to ...
SDN Controllers: A Comprehensive Analysis and Performance Evaluation Study
(
Association for Computing Machinery
, 2021 , Book Review)
Software-defined networks offer flexible and intelligent network operations by splitting a traditional network into a centralized control plane and a programmable data plane. The controller in the control plane is the ...
Accountable credential management system for vehicular communication
(
Elsevier Inc.
, 2020 , Article)
Social Internet of Vehicles (SIoV) is becoming a reality where private and secure communication is a prerequisite. Various standardization organizations and studies have reached a consensus to use Vehicular Public-key ...
Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN
(
Elsevier B.V.
, 2020 , Article)
Information-Centric Networking (ICN) is a novel future network architecture which in contrast to IP-based networks relies on content and its name. It separates the physical location of data from the discovery and forwarding ...
Blockchain-based incentives for secure and collaborative data sharing in multiple clouds
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The prosperity of cloud computing has driven an increasing number of enterprises and organizations to store their data on private or public cloud platforms. Due to the limitation of individual data owners in terms of data ...
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
5G wireless network technology will not only significantly increase bandwidth but also introduce new features such as mMTC and URLLC. However, high request latency will remain a challenging problem even with 5G due to the ...
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering
(
Science in China Press
, 2020 , Article)
The anonymity mechanism of bitcoin is favored by the society, which promotes its usage and development. An adversary should not be able to discover the relation between bitcoin addresses and bitcoin users to ensure effective ...