Safety is the most important requirement for autonomous vehicles; hence, the ultimate challenge of designing an edge computing ecosystem for autonomous vehicles is to deliver …
A comprehensive set of security technology enablers will be critically required for communication systems for the 6G era of the 2030s. Trustworthiness must be assured …
We propose a new platform for user modeling with blockchains that allows users to share data without losing control and ownership of it and applied it to the domain of travel booking …
Widespread adoption of mobile augmented reality (AR) and virtual reality (VR) applications depends on their smoothness and immersiveness. Modern AR applications applying …
O Demigha, R Larguet - Computers & Security, 2021 - Elsevier
The increasing number of threats targeting cloud computing and the exploitation of specifically privileged software vulnerabilities have pushed the security managers of cloud …
Offers a step-by-step guide to building autonomous vehicles and robots, with source code and accompanying videos The first book of its kind on the detailed steps for creating an …
SM Zobaed, MA Salehi - arXiv preprint arXiv:2307.16447, 2023 - arxiv.org
Confidential computing has gained prominence due to the escalating volume of data-driven applications (eg, machine learning and big data) and the acute desire for secure processing …
AK Shrestha, J Vassileva - 2019 IEEE 10th Annual Information …, 2019 - ieeexplore.ieee.org
Currently, there is no universal method to track who shared what, with whom, when and for what purposes in a verifiable way to create an individual incentive for data owners. A …
C Correia, M Correia… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The edge computing paradigm extends cloud computing with storage and processing capacity close to the edge of the network, which can be materialized by using many fog …