Smart applications in edge computing: Overview on authentication and data security
As a new computing paradigm, edge computing has appeared in the public field of vision
recently. Owing to its advantages of low delay and fast response, edge computing has …
recently. Owing to its advantages of low delay and fast response, edge computing has …
Market models and optimization techniques to support the decision-making on demand response for prosumers
Demand Response (DR) programs are essential for easing end-user demand on the power
system, adding benefits across the power sector by reducing peak demand and power flow …
system, adding benefits across the power sector by reducing peak demand and power flow …
Optimal coverage multi-path scheduling scheme with multiple mobile sinks for WSNs
Wireless Sensor Networks (WSNs) are usually formed with many tiny sensors which are
randomly deployed within sensing field for target monitoring. These sensors can transmit …
randomly deployed within sensing field for target monitoring. These sensors can transmit …
Eppda: An efficient privacy-preserving data aggregation federated learning scheme
Federated learning (FL) is a kind of privacy-awaremachine learning, in which the machine
learning models are trained on the users' side and then the model updates are transmitted to …
learning models are trained on the users' side and then the model updates are transmitted to …
Smart and practical privacy-preserving data aggregation for fog-based smart grids
With the increasingly powerful and extensive deployment of edge devices, edge/fog
computing enables customers to manage and analyze data locally, and extends computing …
computing enables customers to manage and analyze data locally, and extends computing …
Trusted authority based session key agreement and authentication algorithm for smart grid networks
The information exchanged over the smart grid networks is sensitive and private. As such,
proper mechanisms must be put in place to protect these messages from security and …
proper mechanisms must be put in place to protect these messages from security and …
Efficient CP-ABE scheme with shared decryption in cloud storage
N Chen, J Li, Y Zhang, Y Guo - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Attribute-based encryption (ABE) is a preferred technology used to access control the data
stored in the cloud servers. However, in many cases, the authorized decryption user may be …
stored in the cloud servers. However, in many cases, the authorized decryption user may be …
FPDP: Flexible privacy-preserving data publishing scheme for smart agriculture
The development of the Internet of Things (IoT) and 5th generation wireless network (5G) is
set to push the smart agriculture to the next level since the massive and real-time data can …
set to push the smart agriculture to the next level since the massive and real-time data can …
Fault-tolerant multisubset aggregation scheme for smart grid
As smart cities and nations are fast becoming a reality, so does the underpinning
infrastructure, such as smart grids. One particular challenge associated with smart grid …
infrastructure, such as smart grids. One particular challenge associated with smart grid …
Privacy-preserving and pairing-free multirecipient certificateless encryption with keyword search for cloud-assisted IIoT
Y Lu, J Li, Y Zhang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Nowadays, cloud-assisted Industrial Internet of Things (IIoT) has become pervasive in
modern enterprises, because it supplies a promising way to transform the operation mode of …
modern enterprises, because it supplies a promising way to transform the operation mode of …