Browse/Search Results: 1-10 of 11

Selected(0)Clear Items/Page:    Sort:
BD-VTE: A Novel Baseline Data Based Verifiable Trust Evaluation Scheme for Smart Network Systems Journal article
IEEE Transactions on Network Science and Engineering,2021, volume: 8, issue: 3, pages: 2087-2105
Authors:  Huang, Shaobo;  Liu, Anfeng;  Zhang, Shaobo;  Wang, Tian;  Xiong, Neal N.
Favorite  |  View/Download:5/0  |  Submit date:2021/12/02
Energy-Efficient Multi-Access Mobile Edge Computing with Secrecy Provisioning Journal article
IEEE Transactions on Mobile Computing,2021, volume: 22, issue: 1, pages: 237-252
Authors:  Qian, Liping;  Wu, Yuan;  Yu, Ningning;  Wang, Daohang;  Jiang, Fuli
Favorite  |  View/Download:14/0  |  Submit date:2021/05/10
A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks Journal article
Pervasive and Mobile Computing,2018, volume: 45, pages: 4-18
Authors:  Meng, Tianhui;  Wolter, Katinka;  Wu, Huaming;  Wang, Qiushi
Favorite  |  View/Download:3/0  |  Submit date:2025/02/20
An empirical performance and security evaluation of android container solutions Conference paper
2017 International Conference on Cyber Security And Protection Of Digital Services, Cyber Security 2017, London, 19 June 2017-20 June 2017
Authors:  Meng, Tianhui;  Shang, Zhihao;  Wolter, Katinka
Favorite  |  View/Download:3/0  |  Submit date:2025/02/20
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part II Book
United States:Springer, 2017
Authors:  Bouguettaya, Athman;  Gao, Yunjun;  Klimenko, Andrey;  Chen, Lu;  Zhang, Xiangliang
Favorite  |  View/Download:5/0  |  Submit date:2021/09/30
Web Information Systems Engineering – WISE 2017 – 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part I Book
United States:Springer, 2017
Authors:  Bouguettaya, Athman;  Gao, Yunjun;  Klimenko, Andrey;  Chen, Lu;  Zhang, Xiangliang
Favorite  |  View/Download:3/0  |  Submit date:2021/09/30
The chaotic video surveillance in mobile camera sensor networks: Improving the efficiency and security Journal article
Ad-Hoc and Sensor Wireless Networks,2017, volume: 37, issue: 1-4, pages: 95-115
Authors:  Wang, Tian;  Wang, Wenhua;  Lai, Yongxuan;  Wen, Sheng;  Tian, Hui
Favorite  |  View/Download:5/0  |  Submit date:2021/12/02
Analysis of mitigation measures for timing attacks in mobile-cloud offloading systems Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Munster, 4 April 2016- 6 April 2016
Authors:  Meng, Tianhui;  Wolter, Katinka
Favorite  |  View/Download:2/0  |  Submit date:2025/02/20
Model-based quantitative security analysis of mobile offloading systems under timing attacks Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Albena, BULGARIA, MAY 26-29, 2015
Authors:  Meng, Tianhui;  Wang, Qiushi;  Wolter, Katinka
Favorite  |  View/Download:4/0  |  Submit date:2025/02/20
Security and performance tradeoff analysis of mobile offloading systems under timing attacks Conference paper
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Madrid, SPAIN, AUG 31-SEP 01, 2015
Authors:  Meng, Tianhui;  Wolter, Katinka;  Wang, Qiushi
Favorite  |  View/Download:3/0  |  Submit date:2025/02/20