書目名稱Green, Pervasive, and Cloud Computing影響因子(影響力)學科排名
書目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡(luò)公開度
書目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡(luò)公開度學科排名
書目名稱Green, Pervasive, and Cloud Computing被引頻次
書目名稱Green, Pervasive, and Cloud Computing被引頻次學科排名
書目名稱Green, Pervasive, and Cloud Computing年度引用
書目名稱Green, Pervasive, and Cloud Computing年度引用學科排名
書目名稱Green, Pervasive, and Cloud Computing讀者反饋
書目名稱Green, Pervasive, and Cloud Computing讀者反饋學科排名
作者: Ointment 時間: 2025-3-21 23:43 作者: 使激動 時間: 2025-3-22 03:24 作者: famine 時間: 2025-3-22 07:12
Withdrawn Ocular Stem Cell Studies,t a technique that allows to save space for storing keys in an HSM, thus reducing the number of needed HSMs. While saving space allows to reduce direct costs, it comes at the expense of computation time. We provide a preliminary experimental evaluation of the extra time needed.作者: 附錄 時間: 2025-3-22 10:56 作者: Hangar 時間: 2025-3-22 14:12 作者: Hangar 時間: 2025-3-22 17:35 作者: EXULT 時間: 2025-3-23 00:18 作者: Extricate 時間: 2025-3-23 03:18 作者: dagger 時間: 2025-3-23 07:09
New Publicly Verifiable Computation for Batch Matrix Multiplication-preserving matrix transformation and matrix digest, our scheme can protect the secrecy of the client’s private matrix . and dramatically reduce the computation cost in both the key generation and the compute phases. The security analysis shows that the proposed scheme can also achieve the desired security properties under the co-CDH assumption.作者: 輕浮思想 時間: 2025-3-23 10:12
Privacy Preserving Multimodal Biometric Authentication in the Clouding attacks are prevented that are applicable even if the templates are stored as encrypted. Finally, the scheme benefits from the advantages of multimodal biometrics and the efficiency of the underlying primitives with linear computation and communication overhead.作者: 可商量 時間: 2025-3-23 17:39
https://doi.org/10.1007/b138573tight bounds for the problem. The computational results, carried out on benchmark instances, confirm the improvements of the bounds computed with respect to the other algorithms proposed in the literature.作者: 圍巾 時間: 2025-3-23 20:58
Post Enucleation Socket Syndromelgorithms leveraging the introduced network structure in order to show the advantages to consider also “user-to-multimedia” relationships (in addition to the “user-to-user” ones) in the influence analysis problem. Preliminary experiments using data of several social media networks shows how our approach obtains very promising results.作者: 埋伏 時間: 2025-3-23 22:49
Improved Upper and Lower Bounds for the Close Enough Traveling Salesman Problemtight bounds for the problem. The computational results, carried out on benchmark instances, confirm the improvements of the bounds computed with respect to the other algorithms proposed in the literature.作者: granite 時間: 2025-3-24 06:09 作者: 消音器 時間: 2025-3-24 07:55 作者: Cholecystokinin 時間: 2025-3-24 11:32
Trust-ABAC Towards an Access Control System for the Internet of Thingsmulation. We used the OMNeT++ simulator to show the efficiency of our model in terms of power consumption, response time and the average number of messages generated by an access request. The obtained results of simulation prove the good scalability of our Trust-ABAC model.作者: Nomadic 時間: 2025-3-24 14:53 作者: degradation 時間: 2025-3-24 20:15 作者: Accomplish 時間: 2025-3-25 02:36
Mark A. Prendes,Bryan R. Costinsed on antenna polarization in M-MIMO systems to re-group users. The proposed scheme effectively reduces the number of users within the beam coverage. On the other hand, we propose a method that adaptively selects channel estimation method according to the power of the user in SIC process to eliminate the effect.作者: 不整齊 時間: 2025-3-25 05:57
Secure User Authentication on Smartphones via Sensor and Face Recognition on Short Video Clipsure authentication protocols. The main achievement of this work is to make the smartphone not only the cause of the problem but also part of the solution. Here, the Sensor Pattern Noise of the smartphone embedded camera and the HOG features of the user’s face are combined for a double check of user identity.作者: 遺傳 時間: 2025-3-25 08:05
MOHAB: Mobile Hand-Based Biometric Recognition and availability, their use in this context appears particularly attractive. The work presented in this study aims at investigating at an high level the limitations of using hand geometry to enable biometric recognition on mobile. The first results obtained were encouraging let supposing potential margins of improvement of the proposed method.作者: infarct 時間: 2025-3-25 12:10 作者: 使腐爛 時間: 2025-3-25 19:42
Withdrawn Ocular Stem Cell Studies,chieve high security standard, an HSM stores keys internally and never exposes them in plaintext; operations involving the keys are performed internally and only the result is given outside the HSM. Thus an HSM must have storage space to store all the keys that have to be managed. In real-world appl作者: Subjugate 時間: 2025-3-25 22:37 作者: 使痛苦 時間: 2025-3-26 01:57
Edward J. Holland,Mark J. Mannis-compliance with the user’s preferences and/or regulations, the difficulty of the data flow tracking, etc. In particular, one unsolved problem is to ensure that customers data usage policies are enforced, regardless of who accesses the data, how they are processed, where are the data stored, transfe作者: conformity 時間: 2025-3-26 07:48 作者: 脫離 時間: 2025-3-26 08:52 作者: Ordnance 時間: 2025-3-26 16:04
Devesh Kumawat,Pradeep Venkateshmomorphic network coding signatures in the random oracle model. But there are still no multi-source homomorphic network coding signatures in the standard model. How to construct it remains an open problem. In this paper, we propose the first multi-source homomorphic network coding signature in the s作者: Freeze 時間: 2025-3-26 17:40 作者: 加花粗鄙人 時間: 2025-3-26 23:29
Fairooz P. Manjandavida,Shaifali Chaharcrypted storage and processing in the encrypted domain, the biometric database can be outsourced to the cloud. Our scheme is based on the combination of two different cryptographic primitives operating on encrypted biometric templates generated either from a single trait such as fingerprint or multi作者: Gleason-score 時間: 2025-3-27 02:42 作者: 得意牛 時間: 2025-3-27 06:21
https://doi.org/10.1007/978-981-287-846-5owever, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network communications between a login user and a remote server. In 2016, Han et al. proposed a secure three-facto作者: Verify 時間: 2025-3-27 12:16
Mark A. Prendes,Bryan R. Costinffect that occurs to the NOMA downlink and serial interference cancellation (SIC). To avoid near-far effect, we propose 3D beam forming application based on antenna polarization in M-MIMO systems to re-group users. The proposed scheme effectively reduces the number of users within the beam coverage.作者: CUMB 時間: 2025-3-27 15:48 作者: 畢業(yè)典禮 時間: 2025-3-27 19:08
Surgical Anatomy of the Eyelid, in cloud platforms, VMs (. .) are easily affected by the synchronization latency problem which leads to serious performance degradation. There are two main reasons. The first is that a host is unaware of the synchronization requirements of the guest OS. The second is that the synchronization reques作者: 閹割 時間: 2025-3-27 23:54
https://doi.org/10.1007/b138573ode if it passes through the neighborhood of that node. We introduce an improved version of the adaptive internal discretization scheme, recently proposed in the literature, and a heuristic that combines this scheme with to a second-order cone programming algorithm. Our heuristic is able to compute 作者: Decline 時間: 2025-3-28 06:00 作者: 錯事 時間: 2025-3-28 07:10
J. Javier Servat MD,Eric B. Baylin MD provisioning virtualized resources. Such data centers consume an enormous amount of energy, resulting in high operational cost and carbon dioxide emission. Meanwhile, cloud providers need to ensure Quality of Service (QoS) in the computing solution delivered to their customers, and hence must consi作者: Finasteride 時間: 2025-3-28 13:17
Post Enucleation Socket Syndromey all the different kinds of relationships that are typical of these environments (among multimedia contents, among users and multimedia content and among users themselves) and to enable several kinds of analytics and applications. From the other hand, we have tested several influence maximization a作者: 故意 時間: 2025-3-28 16:22 作者: CEDE 時間: 2025-3-28 22:28 作者: 盡管 時間: 2025-3-29 00:46
A Hybrid Approach for Private Data Protection in the Cloud-compliance with the user’s preferences and/or regulations, the difficulty of the data flow tracking, etc. In particular, one unsolved problem is to ensure that customers data usage policies are enforced, regardless of who accesses the data, how they are processed, where are the data stored, transfe作者: organic-matrix 時間: 2025-3-29 05:41
An Efficient and Secure Design of Redactable Signature Scheme with Redaction Condition Controlopriate alteration of signed message should be allowed for the purposes of privacy protection or bandwidth saving in some scenarios, such as medical record or official information disclosure. Redactable signatures, a branch of homomorphic signatures for editing, allow any redactor to remove some sub作者: Obloquy 時間: 2025-3-29 10:34 作者: obeisance 時間: 2025-3-29 13:45
A Multi-source Homomorphic Network Coding Signature in the Standard Modelmomorphic network coding signatures in the random oracle model. But there are still no multi-source homomorphic network coding signatures in the standard model. How to construct it remains an open problem. In this paper, we propose the first multi-source homomorphic network coding signature in the s作者: fallible 時間: 2025-3-29 15:42
Trust-ABAC Towards an Access Control System for the Internet of Thingslve security and privacy issues. The use of complex encryption algorithms is infeasible due to the volatile nature of IoT environment and pervasive devices with limited resources. In this paper, we present the Trust-ABAC, an access control model for the Internet of Things, in which a coupling betwee作者: 預(yù)測 時間: 2025-3-29 22:58
Privacy Preserving Multimodal Biometric Authentication in the Cloudcrypted storage and processing in the encrypted domain, the biometric database can be outsourced to the cloud. Our scheme is based on the combination of two different cryptographic primitives operating on encrypted biometric templates generated either from a single trait such as fingerprint or multi作者: CALL 時間: 2025-3-30 00:31
MOHAB: Mobile Hand-Based Biometric Recognitionh lines and taking into consideration different traits. On the other hand, few studies tackle its feasibility on mobile devices. Given their diffusion and availability, their use in this context appears particularly attractive. The work presented in this study aims at investigating at an high level 作者: LUDE 時間: 2025-3-30 04:56
Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme owever, remote online systems are vulnerable to many security attacks due to they are built on public networks. Therefore it is necessary to design an authentication scheme for securing network communications between a login user and a remote server. In 2016, Han et al. proposed a secure three-facto作者: STEER 時間: 2025-3-30 09:03
A Study of Interference Cancellation for NOMA Downlink Near-Far Effect to Support Big Dataffect that occurs to the NOMA downlink and serial interference cancellation (SIC). To avoid near-far effect, we propose 3D beam forming application based on antenna polarization in M-MIMO systems to re-group users. The proposed scheme effectively reduces the number of users within the beam coverage.作者: Precursor 時間: 2025-3-30 15:51
Dynamic Latency Sensitivity Recognition: An Application to Energy Saving sanitization of the Internet traffic is a real necessity. In this paper we will apply a dynamic statistical analysis to separate latency sensitive traffic from the latency insensitive one at the source. Then, we will calculate the energy savings that can be achieved by identifying and dropping all 作者: 拖債 時間: 2025-3-30 19:46 作者: constellation 時間: 2025-3-30 21:14 作者: Humble 時間: 2025-3-31 01:33
Object Storage in Cloud Computing Environments: An Availability Analysis in the form of objects accessible via REST APIs. An interesting implementation of OSS is based on Swift, a component of OpenStack, the most important platform exploited to deploy the Infrastructure as a Service (IaaS) paradigm. The present work is aimed at characterizing a Swift-based OSS from the 作者: 排斥 時間: 2025-3-31 08:30 作者: 沒有準備 時間: 2025-3-31 10:39
Influence Maximization in Social Media Networks Using Hypergraphsy all the different kinds of relationships that are typical of these environments (among multimedia contents, among users and multimedia content and among users themselves) and to enable several kinds of analytics and applications. From the other hand, we have tested several influence maximization a作者: Scleroderma 時間: 2025-3-31 14:54