A secure cloud-assisted urban data sharing framework for ubiquitous-cities

J Shen, D Liu, J Shen, Q Liu, X Sun - Pervasive and mobile Computing, 2017 - Elsevier
With the accelerated process of urbanization, more and more people tend to live in cities. In
order to deal with the big data that are generated by citizens and public city departments …

SDN based communications privacy-preserving architecture for VANETs using fog computing

M Arif, G Wang, VE Balas, O Geman… - Vehicular …, 2020 - Elsevier
Abstract Vehicular Ad-hoc Networks (VANETs) have become the one of the most,
reassuring, encouraging and the quickest develo** subsets of Mobile Ad-hoc Networks …

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices

D He, H Wang, L Wang, J Shen, X Yang - Soft Computing, 2017 - Springer
With the popularity of mobile devices, how to enhance the security and privacy in wireless
communications has gained comprehensive attention. Many cryptographic schemes have …

Improving security in cloud by formal modeling of IaaS resources

F Amato, F Moscato, V Moscato, F Colace - Future Generation Computer …, 2018 - Elsevier
Nowadays, it is a matter of fact that Cloud is a “must” for all complex services requiring great
amount of resources. Big-Data Services are a striking example: they actually perform many …

A denial of service attack to UMTS networks using SIM-less devices

A Merlo, M Migliardi, N Gobbo… - … on Dependable and …, 2014 - ieeexplore.ieee.org
One of the fundamental security elements in cellular networks is the authentication
procedure performed by means of the Subscriber Identity Module that is required to grant …

Text compression and encryption through smart devices for mobile communication

R Pizzolante, B Carpentieri… - … on Innovative Mobile …, 2013 - ieeexplore.ieee.org
Today's life of e-citizens relies more and more on the" always-on" paradigm. This
transformed our lives in a way that it is difficult, and sometimes impossible, to deal with day …

Do you trust your phone?

A Castiglione, R De Prisco, A De Santis - E-Commerce and Web …, 2009 - Springer
Despite the promising start, Electronic Commerce has not taken off mostly because of
security issues with the communication infrastructures that are pop** up threateningly …

A novel steganography approach for voice over IP

Z Wei, B Zhao, B Liu, J Su, L Xu, E Xu - Journal of Ambient Intelligence …, 2014 - Springer
In homeland defense and security, secure data transfer is still critical challenging due to the
open nature of Internet. One of the solutions which came to the rescue is the VoIP (Voice …

Model driven design and evaluation of security level in orchestrated cloud services

F Amato, N Mazzocca, F Moscato - Journal of Network and Computer …, 2018 - Elsevier
Cloud-based architectures, services and resources are growing up in complexity day by day.
Composition and Orchestration deal with the problem of creating complex services …

An energy-aware framework for reliable and secure end-to-end ubiquitous data communications

A Castiglione, A De Santis… - 2013 5th …, 2013 - ieeexplore.ieee.org
Despite the wide deployment of beyond 3G cellular networks and high capacity Wi-Fi
coverage infrastructures, finding the best way for achieving ubiquitous and secure mobile …