Zobrazeno 1 - 10
of 54
pro vyhledávání: '"Wassim Itani"'
Publikováno v:
Sensors, Vol 15, Iss 2, Pp 3299-3333 (2015)
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trus
Externí odkaz:
https://doaj.org/article/d357967f8254464e8c601f03e8a79784
Publikováno v:
GLOBECOM 2022 - 2022 IEEE Global Communications Conference.
Publikováno v:
2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid).
Publikováno v:
Future Generation Computer Systems. 112:767-784
Bandwidth allocation is an important and influential factor in enhancing the performance of the data centers’ nodes. In this paper we propose bwSlicer , a framework for bandwidth slicing in cloud data centers, that sheds light on the virtues of eff
Publikováno v:
IWCMC
The advancement in medical technology lead to the controlled monitoring of patients in recovery or at home even for patients with dementia. With all this progress the procedure for selecting viable donors remains for the most part unchanged. As such
Publikováno v:
2021 7th International Conference on Electrical Energy Systems (ICEES).
Ever since it gained prominence IoT has been center stage being used for everything from industrial and athlete performance monitoring to medical application. With all the push toward miniaturization researchers have yet to produce a device that is b
Publikováno v:
Kaleidoscope
IoT is a concept consisting of many components powered by different techniques and technologies. However, due to computation restrictions, encryption algorithms had to be adapted, often at the expense of lower data security levels and strength. To ma
Publikováno v:
Sustainable Computing: Informatics and Systems. 19:185-203
To meet the growing demands on cloud services and applications, a sizeable number of large scale cloud data centers, hosting thousands of heterogeneous servers, is established by cloud service providers. The ever growth in establishing cloud data cen
Publikováno v:
MENACOMM
The services offered by cloud computing are provided to individuals and organizations by varied shared resources which are forming the hardware layer of cloud data centers. Cloud users do not deal or interact directly with those resources, instead, t
Publikováno v:
MENACOMM
In this work, we present a secure authentication protocol for edge computing using the Software-Defined Networking platform and wireless network virtualization. The main contribution of the presented protocol lies in: (1) designing and implementing a