Zobrazeno 1 - 10
of 50
pro vyhledávání: '"Xingpo Ma"'
Publikováno v:
IEEE Access, Vol 6, Pp 16755-16769 (2018)
In this paper, we present a low complexity bit-parallel Montgomery multiplier for $GF(2^{m})$ generated with irreducible Type C.1 pentanomials $x^{m}+x^{m-1}+x^{k}+x+1$ . Based on a combination of generalized polynomial basis (GPB) squarer and a newl
Externí odkaz:
https://doaj.org/article/05676e275f854d9c8705f444d4fd6a57
Publikováno v:
Connection Science. 33:62-80
Integrity and privacy are two important secure matrices in cyber security. Due to the limited resources and computing capability of the sensor nodes, it is challenging to simultaneously satisfy the...
Publikováno v:
IEEE Transactions on Circuits and Systems I: Regular Papers. 67:852-865
The ${n}$ -term Karatsuba algorithm (KA) is an extension of 2-term KA, which can obtain even fewer multiplications than the original one. The existing ${n}$ -term Karatsuba hybrid $\textit {GF}(2^{m})$ multipliers rely on factorization of ${m}$ or ${
Publikováno v:
Information, Vol 9, Iss 8, p 200 (2018)
Geographical location and mobile phone numbers are important parts of user privacy and lots of studies have been working on the privacy leakage problems of these two aspects. However, no researchers have ever studied the security problems that can be
Externí odkaz:
https://doaj.org/article/2051c364a4884032b3418cb419ccb2cc
Publikováno v:
Sensors, Vol 18, Iss 3, p 871 (2018)
A novel network paradigm of mobile edge computing, namely TMWSNs (two-tiered mobile wireless sensor networks), has just been proposed by researchers in recent years for its high scalability and robustness. However, only a few works have considered th
Externí odkaz:
https://doaj.org/article/cbf16d95e9514c00a4b2343d94d8b46d
Publikováno v:
Sensors, Vol 18, Iss 2, p 546 (2018)
In the post-Cloud era, the proliferation of Internet of Things (IoT) has pushed the horizon of Edge computing, which is a new computing paradigm with data processed at the edge of the network. As the important systems of Edge computing, wireless sens
Externí odkaz:
https://doaj.org/article/06f412c348c44924856caf708f73a084
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
Verifiable top- k query processing in tiered sensor networks, which refers to verifying the authenticity and the completeness of top- k query results received by the network owner in tiered sensor networks, has received attention in very recent years
Externí odkaz:
https://doaj.org/article/549fab3af6004dbdb2f531513e551610
Publikováno v:
IEEE Internet of Things Journal. 6:10093-10104
A novel network paradigm of edge computing, namely, two-tiered wireless sensor networks (TWSNs), has been proposed by researchers in recent years for its high scalability and robustness. However, in the TWSNs-based edge computing systems, the storage
To ensure the security of spatial-temporal Top-k query in two-tiered wireless sensor networks, many schemes have been proposed in the literature in the past decade. However, most of them only consider the scenario where sensor nodes are static, and c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3713bef46abfd31af3951a10ab75b1ed
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Network function virtualization (NFV) has the potential to lead to significant reductions in capital expenditure and can improve the flexibility of the network. Virtual network function (VNF) deployment problem will be one of key problems that need t