BSIS: Blockchain-based secure incentive scheme for energy delivery in vehicular energy network

Y Wang, Z Su, N Zhang - IEEE transactions on industrial …, 2019 - ieeexplore.ieee.org
Vehicular energy network (VEN), as an important part of the Internet of Things for the smart
city, can facilitate the renewable energy (RE) transportation over a large geographical area …

A multi-stage stochastic programming-based offloading policy for fog enabled IoT-eHealth

L Zhang, B Cao, Y Li, M Peng… - IEEE Journal on Selected …, 2020 - ieeexplore.ieee.org
To meet low latency and real-time monitoring demands of IoT-eHealth, fog computing is
envisioned as a key technology to offer elastic computing resource at the edge of networks …

A review of cyber security in cryptography: Services, attacks, and key approach

C Prabha, N Sharma, J Singh… - … and Smart Energy …, 2023 - ieeexplore.ieee.org
Security has become more important in several industries in recent years. It's not that the
necessity to protect data is new; it dates back to the first and second world wars, and even to …

Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing

Y Wang, L Chen, G Wu, K Yu, T Lu - Computers & Security, 2023 - Elsevier
Smart devices offer a variety of more convenient forms to help us record our lives and
generate a large amount of data in this process. Limited by the local storage capacity, many …

An efficient delay aware emergency message dissemination and data retrieval in secure VANET-cloud environment

M Al-Shabi - Wireless Personal Communications, 2023 - Springer
Over the recent decades, incorporating Vehicular Ad-hoc Network (VANET) into Cloud
computing plays a vital role, since it provides a reliable safety journey to vehicular drivers …

An efficient model for vehicular cloud computing with prioritizing computing resources

M Tahmasebi, MR Khayyambashi - Peer-to-Peer Networking and …, 2019 - Springer
In recent years, even though there has been a lot of progress in automotive industry and
their offered services but not all of their computational capacities have yet been used. The …

A privacy-protected image retrieval scheme for fast and secure image search

A Du, L Wang, S Cheng, N Ao - Symmetry, 2020 - mdpi.com
With the development of multimedia technology, the secure image retrieval scheme has
become a hot research topic. However, how to further improve algorithm performance in the …

Privacy-preserving searchable encryption in the intelligent edge computing

Q Chen, K Fan, K Zhang, H Wang, H Li… - Computer Communications, 2020 - Elsevier
In intelligent edge computing, the private data of users are partly or entirely outsourced to
the intelligent edge nodes for processing. To enforce security and privacy on edge network …

A secure road condition monitoring scheme in cloud based VANET

B Baruah, S Dhal - Computer Communications, 2021 - Elsevier
Connected vehicular cloud computing (CVCC) is a promising technology that integrates
cloud computing and vehicular ad-hoc network (VANET) for road condition monitoring tasks …

A privacy-preserving image retrieval scheme based secure kNN, DNA coding and deep hashing

SL Cheng, LJ Wang, G Huang, AY Du - Multimedia Tools and Applications, 2021 - Springer
In recent years, information leakage incidents occur frequently. Ciphertext domain search
has become a hot spot in multimedia technology and software engineering. Therefore, how …