NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 53
1.
  • Secure Data Storage and Sea... Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing
    Fu, Jun-Song; Liu, Yun; Chao, Han-Chieh ... IEEE transactions on industrial informatics, 10/2018, Letnik: 14, Številka: 10
    Journal Article

    With the fast development of industrial Internet of things (IIoT), a large amount of data is being generated continuously by different sources. Storing all the raw data in the IIoT devices locally is ...
Celotno besedilo
2.
  • A Blockchain-Enabled Trustl... A Blockchain-Enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge Computing
    Xu, Jinliang; Wang, Shangguang; Bhargava, Bharat K. ... IEEE transactions on industrial informatics, 06/2019, Letnik: 15, Številka: 6
    Journal Article
    Odprti dostop

    Crowd intelligence tries to gather, process, infer, and ascertain massive useful information by utilizing the intelligence of crowds or distributed computers, which has great potential in Industrial ...
Celotno besedilo

PDF
3.
  • A Novel Low-Rate Denial of ... A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation
    Chen, Hongsong; Meng, Caixia; Shan, Zhiguang ... IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Low-rate Denial of Service (LDoS) attack is a special DoS attack. The routing protocol is vulnerable to many types of attacks in a wireless sensor network (WSN), which is an important network type of ...
Celotno besedilo

PDF
4.
  • ABAUS: Active Bundle AUthen... ABAUS: Active Bundle AUthentication Solution Based on SDN for Vehicular Networks
    Alsalem, Aala; Bhargava, Bharat K. IEEE access, 2024, Letnik: 12
    Journal Article
    Recenzirano
    Odprti dostop

    Vehicular ad hoc networks (VANETs) are gaining more and more interest in intelligence transportation system research fields. They allow optimized traffic management due to improved vehicle resource ...
Celotno besedilo
5.
  • A hybrid architecture for c... A hybrid architecture for cost-effective on-demand media streaming
    Hefeeda, Mohamed M.; Bhargava, Bharat K.; Yau, David K.Y. Computer networks (Amsterdam, Netherlands : 1999), 02/2004, Letnik: 44, Številka: 3
    Journal Article
    Recenzirano

    We propose a new architecture for on-demand media streaming centered around the peer-to-peer (P2P) paradigm. The key idea of the architecture is that peers share some of their resources with the ...
Celotno besedilo
6.
  • Invisible watermarking base... Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks
    Mohanty, Saraju P.; Bhargava, Bharat K. ACM transactions on multimedia computing communications and applications, 11/2008, Letnik: 5, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    This article presents a novel invisible robust watermarking scheme for embedding and extracting a digital watermark in an image. The novelty lies in determining a perceptually important subimage in ...
Celotno besedilo

PDF
7.
  • Source-Location Privacy Pro... Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks
    Wang, Na; Fu, Junsong; Li, Jian ... IEEE transactions on information forensics and security, 2020, Letnik: 15
    Journal Article
    Recenzirano

    An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect radio traffic distributions and trace back messages to their source nodes. Then, he can locate the monitored ...
Celotno besedilo
8.
  • Efficient Retrieval Over Do... Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing
    Wang, Na; Fu, Junsong; Bhargava, Bharat K. ... IEEE transactions on information forensics and security, 2018-Oct., 2018-10-00, Letnik: 13, Številka: 10
    Journal Article
    Recenzirano

    Secure document storage and retrieval is one of the hottest research directions in cloud computing. Though many searchable encryption schemes have been proposed, few of them support efficient ...
Celotno besedilo
9.
  • Source-location privacy ful... Source-location privacy full protection in wireless sensor networks
    Wang, Na; Fu, Junsong; Zeng, Jiwen ... Information sciences, 20/May , Letnik: 444
    Journal Article
    Recenzirano

    In many scenarios, the locations of monitored targets need to be reported by source nodes, but should remain anonymous in wireless sensor networks. Source-location privacy protection is an important ...
Celotno besedilo
10.
  • A Practical Framework for S... A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems
    Fu, Junsong; Wang, Na; Cui, Baojiang ... IEEE transactions on parallel and distributed systems, 2022-May-1, 2022-5-1, Letnik: 33, Številka: 5
    Journal Article
    Recenzirano

    With the development of cloud computing, more and more data owners are motivated to outsource their documents to the cloud and share them with the authorized data users securely and flexibly. To ...
Celotno besedilo
1 2 3 4 5
zadetkov: 53

Nalaganje filtrov