Edgelet computing: enabling privacy-preserving decentralized data processing at the network edge

L Javet, N Anciaux, L Bouganim, P Pucheral - Personal and Ubiquitous …, 2024 - Springer
The convergence of opportunistic networks and trusted execution environments at the
network edge presents a compelling opportunity for fully decentralized privacy-preserving …

Edgelet Computing: Enabling Privacy-Preserving Decentralized Data Processing at the Network Edge

L Javet, N Anciaux, L Bouganim… - Personal and Ubiquitous …, 2024 - inria.hal.science
The convergence of Opportunistic Networks and Trusted Execution Environments at the
network edge presents a compelling opportunity for fully decentralized privacy-preserving …

Edgelet Computing: Enabling Privacy-Preserving Decentralized Data Processing at the Network Edge

L Javet, N Anciaux, L Bouganim… - Personal and …, 2024 - universite-paris-saclay.hal.science
The convergence of Opportunistic Networks and Trusted Execution Environments at the
network edge presents a compelling opportunity for fully decentralized privacy-preserving …

Edgelet Computing: Enabling Privacy-Preserving Decentralized Data Processing at the Network Edge

L Javet, N Anciaux, L Bouganim… - Personal and Ubiquitous …, 2024 - hal.em-lyon.com
The convergence of Opportunistic Networks and Trusted Execution Environments at the
network edge presents a compelling opportunity for fully decentralized privacy-preserving …

Edgelet Computing: Enabling Privacy-Preserving Decentralized Data Processing at the Network Edge

L Javet, N Anciaux, L Bouganim… - Personal and …, 2024 - hal-ciheam.iamm.fr
The convergence of Opportunistic Networks and Trusted Execution Environments at the
network edge presents a compelling opportunity for fully decentralized privacy-preserving …

Edgelet Computing: Enabling Privacy-Preserving Decentralized Data Processing at the Network Edge

L Javet, N Anciaux, L Bouganim… - Personal and Ubiquitous …, 2024 - hal.science
The convergence of Opportunistic Networks and Trusted Execution Environments at the
network edge presents a compelling opportunity for fully decentralized privacy-preserving …