Dandelion: A unified code offloading system for wearable computing

M Golkarifard, J Yang, Z Huang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Execution speed seriously bothers application developers and users for wearable devices
such as Google Glass. Intensive applications like 3D games suffer from significant delays …

Secure overlay routing using key pre-distribution: A linear distance optimization approach

M Gharib, H Yousefi'zadeh… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Key pre-distribution algorithms have recently emerged as efficient alternatives of key
management in today's secure communications landscape. Secure routing techniques using …

Kpsec: Secure end-to-end communications for multi-hop wireless networks

M Gharib, A Owfi, S Ghorbani - arXiv preprint arXiv:1911.05126, 2019 - arxiv.org
The security of cyber-physical systems, from self-driving cars to medical devices, depends
on their underlying multi-hop wireless networks. Yet, the lack of trusted central …

BlocKP: Key-Predistribution-Based Secure Data Transfer

M Gharib, A Owfi, F Afghah… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Key predistribution schemes are promising lightweight solutions to be placed as the
cornerstone of key management systems in multihop wireless networks. The intermediate …

[图书][B] Towards a private new world: Algorithm, protocol, and hardware co-design for large-scale secure computation

MS Riazi - 2020 - search.proquest.com
Data privacy and security are among the grand challenges in the emerging era of massive
data and collective intelligence. On the one hand, the rapid advances of several …

[PDF][PDF] SECURE TRANSFERRING ROUTING USING PRIMARY PRE SHARE AN OPTIMIZATION ADVANCE FOR REMOTE OPTIMIZATION

KD Bhavani, IH Latha - academia.edu
Trivial safe communications between a random set of network nodes requires each node to
keep n-1 pairwise keys within the situation of symmetrical cryptography and n-1 people keys …

[PDF][PDF] A Protected Transfer Routing with Key Pre-Sharing: A Linear Coldness Optimization Approach

VS CHANDANA, Y LAKSHMI - core.ac.uk
Trivial secure communications inside the random quantity of network nodes requires each
node to help keep n-1 pairwise keys inside the situation of symmetric cryptography and n-1 …

[PDF][PDF] Restricted Routing Protocol For Contribution Of Optimization Method

CH TEJASVI - academia.edu
Simple secure connections between a random set of network nodes require that each node
maintains the n-1 keys for each pair within the state of symmetric encryption and public keys …

[PDF][PDF] A Sybil Safe Virtualization-based Public Key Management Scheme for Mobile Ad Hoc Networks

RF e Silva, E da Silva, LCP Albini - … : Multidisciplinary Journals in …, 2014 - researchgate.net
A Sybil attacker is a malicious node which creates several false identities to itself. This attack
is extremely harmfull to any voting or cooperation-based system, like a MANET. MANETs …

[PDF][PDF] Protected Transfer Steering Using Explanation Pre-Division For Reserve Optimization Emerge

T JYOTHSNA - core.ac.uk
Trivial insure publicity'teen a arbitrary set of structure nodes requires each node to keep n-1
pair wise keys not over the position of proportionate cryptanalysis and n-1 overt keys in …