Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges

U Shaukat, E Ahmed, Z Anwar, F Xia - Journal of Network and Computer …, 2016 - Elsevier
In past few years, advancement in mobile applications and their integration with Cloud
computing services has introduced a new computing paradigm known as Mobile Cloud …

The adoption of remote work platforms after the Covid-19 lockdown: New approach, new evidence

JM Sahut, R Lissillour - Journal of Business Research, 2023 - Elsevier
With the aim of providing further insights into the driving factors influencing behavioral
intentions and expectations to use remote work after the Covid-19 lockdown, this study …

Antecedents and consequences of cloud computing adoption in education to achieve knowledge management

I Arpaci - Computers in Human Behavior, 2017 - Elsevier
The effective management of knowledge is critical to achieve high academic performance,
effectiveness, and efficiency. Adoption of cloud computing in education has the potential to …

Blockchain-based fair payment smart contract for public cloud storage auditing

H Wang, H Qin, M Zhao, X Wei, H Shen, W Susilo - Information Sciences, 2020 - Elsevier
Cloud storage plays an important role in today's cloud ecosystem. Increasingly clients tend
to outsource their data to the cloud. In spite of its copious advantages, integrity has always …

An efficient file hierarchy attribute-based encryption scheme in cloud computing

S Wang, J Zhou, JK Liu, J Yu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption
technology to solve the challenging problem of secure data sharing in cloud computing. The …

Result pattern hiding searchable encryption for conjunctive queries

S Lai, S Patranabis, A Sakzad, JK Liu… - Proceedings of the …, 2018 - dl.acm.org
The recently proposed Oblivious Cross-Tags (OXT) protocol (CRYPTO 2013) has broken
new ground in designing efficient searchable symmetric encryption (SSE) protocol with …

Realising the technological promise of smartphones in addiction research and treatment: an ethical review

H Capon, W Hall, C Fry, A Carter - International Journal of Drug Policy, 2016 - Elsevier
Background Smartphone technologies and mHealth applications (or apps) promise
unprecedented scope for data collection, treatment intervention, and relapse prevention …

Attribute-based data sharing scheme revisited in cloud computing

S Wang, K Liang, JK Liu, J Chen… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption
technique for secure data sharing in the context of cloud computing. Data owner is allowed …

An efficient non-interactive multi-client searchable encryption with support for boolean queries

SF Sun, JK Liu, A Sakzad, R Steinfeld… - … Security–ESORICS 2016 …, 2016 - Springer
Motivated by the recent searchable symmetric encryption protocol of Cash et al., we propose
a new multi-client searchable encryption protocol in this work. By tactfully leveraging the …

Forward and backward private conjunctive searchable symmetric encryption

S Patranabis, D Mukhopadhyay - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Dynamic searchable symmetric encryption (SSE) supports updates and keyword searches
in tandem on outsourced symmetrically encrypted data, while aiming to minimize the …