Search
Now showing items 1-10 of 23
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health and itinerary planning. ...
A Novel Efficient Classwise Sparse and Collaborative Representation for Holistic Palmprint Recognition
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Palmprint recognition is an important and widely used modality in biometric systems. It has a high reliability, stability and user acceptability. Although the discriminative ability of the existing state-of-the-art holistic ...
TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles
(
Association for Computing Machinery, Inc
, 2019 , Conference Paper)
Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ...
Securing IoT Cooperative Networks Using Energy Harvesting.
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...
Securing IoT Cooperative Networks Using Energy Harvesting.
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
An energy efficient and secure Internet of Things (IoT) healthcare system is proposed in this paper. By exploiting spatial diversity, energy harvesting and physical layer security techniques, the proposed approach secures ...
Secure and Optimized Load Balancing for Multitier IoT and Edge-Cloud Computing Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Mobile-edge computing (MEC) has emerged as a new computing paradigm with great potential to alleviate resource limitations attributed to mobile device users (MDUs) by offloading intensive computations to ubiquitous MEC ...
A survey on federated learning: The journey from centralized to distributed on-site learning and beyond
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Driven by privacy concerns and the visions of deep learning, the last four years have witnessed a paradigm shift in the applicability mechanism of machine learning (ML). An emerging model, called federated learning (FL), ...