A survey on mobile edge computing: The communication perspective

Y Mao, C You, J Zhang, K Huang… - … surveys & tutorials, 2017 - ieeexplore.ieee.org
Driven by the visions of Internet of Things and 5G communications, recent years have seen
a paradigm shift in mobile computing, from the centralized mobile cloud computing toward …

Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges

R Roman, J Lopez, M Mambo - Future Generation Computer Systems, 2018 - Elsevier
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …

[PDF][PDF] Mobile edge computing: Survey and research outlook

Y Mao, C You, J Zhang, K Huang… - arXiv preprint arXiv …, 2017 - researchgate.net
Driven by the visions of Internet of Things and 5G communications, recent years have seen
a paradigm shift in mobile computing, from the centralized Mobile Cloud Computing towards …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Constrained pseudorandom functions and their applications

D Boneh, B Waters - Advances in Cryptology-ASIACRYPT 2013: 19th …, 2013 - Springer
We put forward a new notion of pseudorandom functions (PRFs) we call PRFs. In a standard
PRF there is a master key k that enables one to evaluate the function at all points in the …

An attribute-based encryption scheme to secure fog communications

A Alrawais, A Alhothaily, C Hu, X Xing, X Cheng - IEEE access, 2017 - ieeexplore.ieee.org
Fog computing is deemed as a highly virtualized paradigm that can enable computing at the
Internet of Things devices, residing in the edge of the network, for the purpose of delivering …

A survey on privacy and access control schemes in fog computing

T Khalid, MAK Abbasi, M Zuraiz… - International Journal …, 2021 - Wiley Online Library
To provide reliable data storage and retrieval services to the end users, the cloud service
provider implements secure data storage, sharing, and retrieval mechanisms. However, the …

[HTML][HTML] Overview of the integration of communications, sensing, computing, and storage as enabling technologies for the metaverse over 6G networks

L Zhang, Q Du, L Lu, S Zhang - Electronics, 2023 - mdpi.com
The metaverse, as an envisioned paradigm of the future internet, aims to establish an
immersive and multidimensional virtual space in which global users can interact with one …

Match me if you can: Matchmaking encryption and its applications

G Ateniese, D Francati, D Nuñez, D Venturi - Advances in Cryptology …, 2019 - Springer
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …

Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud

K Sundar, S Sasikumar, C Jayakumar - Quantum Information Processing, 2022 - Springer
In today's scenario of computing paradigm, the cloud framework has become a significant
solution on peak of virtualization for the utilization of computing models. However, the model …