A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks
2013
Journal on spesial topics in mobile networks and applications
Imrich Chlamtac for giving the opportunity to edit this special issue on Developments in Security and Privacypreserving mechanisms for Future Mobile Communication Networks, and Dr. ...
The objective of this special issue is to foster state-ofthe-art contributions in the area of security, privacy, and its applications for future mobile communication networks. ...
solutions for mobile and heterogeneous environments. ...
doi:10.1007/s11036-013-0487-2
fatcat:64d5lodo4rfj7pwzioixovf5nm
Editorial
2021
International Journal of Information Technology
Science, especially addressing current research problems related to Network Security, Web Filtering, Convolutional Neural Networks, IoT, Robotics, Augmented Reality and Privacy Preserving Data Mining; ...
The manuscript ''Energy preservation and network critic based channel scheduling (EPNCS) in cognitive radio sensor networks'', Veeranna Gatate et al. designs a novel algorithm for energy preservation and ...
doi:10.1007/s41870-021-00612-2
pmid:33527094
pmcid:PMC7839620
fatcat:qvelaf2pojgfrkebv7ym5dqaju
Editorial: special issue on ubiquitous electronic commerce systems
2010
Electronic Commerce Research
He is also Associate Editor of the IEEE Transactions on Information Forensics and Security, Associate Editor of Security and Communication Networks Journal ...
His current research interests include applied cryptography, data and multimedia security, wireless and sensor network security, and trusted computing. ...
It is composed of 5 refereed papers covering such topics as location-based services, secure ubiquitous multimedia sharing, intelligent multimedia services, and privacy preserving in commercial networks ...
doi:10.1007/s10660-010-9071-z
fatcat:flmrkab3cnbgzbsuxemwzzapi4
IEEE Access Special Section Editorial: Trusted Computing
2020
IEEE Access
In order to protect identity privacy, in the article by Niu et al., the authors proposed ''A privacy-preserving identification mechanism for mobile sensing systems.'' ...
TRUSTWORTHY RECOMMENDATION In order to solve cold start problems and preserve data privacy, in the article ''A privacy-preserving framework for trust-oriented point-of-interest recommendation,'' Liu et ...
doi:10.1109/access.2020.2969768
fatcat:il5i7ofsbrdgho6m6roodlrqsy
Quantum Communications [Guest Editorial]
2013
IEEE Communications Magazine
in developing the design rules for amplified DWDM networks. ...
He has made contributions on different wireless access technologies, mobility protocols, security and privacy, reconfigurable systems, and quantum-computing-based algorithms and protocols. ...
doi:10.1109/mcom.2013.6576334
fatcat:kbpnma6ilbbe7j53obtgf5txfq
Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation
2021
IEEE Network
The Special Issue focuses on several topics that are recent concerns in the community, including data integrity and privacy preservation, cloud/ edge/fog analysis for big data evaluations, energy harvesting ...
, inter-drone communications, secure content dissemination, software defined drone networks, IoT architectures and protocols, and other enabling technologies to realize the vision of block drones through ...
Wang, for his unwavering support and guidance in preparing and finalizing this editorial. ...
doi:10.1109/mnet.2021.9355047
fatcat:rtbml7qwbfehrgi53s5vy5mzzu
Guest Editorial Special Issue on Cybertwin-Driven 6G: Architectures, Methods, and Applications
2021
IEEE Internet of Things Journal
The article "Application of cybertwin for offloading in mobile multiaccess edge computing for 6G networks" exploits the multiaccess edge computing (MEC) technology for the future IoT network. ...
The article "Post-quantum secure ring signatures for security and privacy in the cybertwin-driven 6G" proposes postquantum secure ring signatures to enhance security and privacy in cybertwin-driven 6G ...
Quan Yu received the B.S. degree in information physics from Nanjing University, Nanjing, China, in 1986, the M.S. degree in radio wave propagation from Xidian University, Xi 'an, China, in 1988, and ...
doi:10.1109/jiot.2021.3115295
fatcat:xgba5phtbnhxhl7axogyhpseiu
Editorial
2015
Online information review (Print)
Acknowledgements The authors would like to thank all the workshop participants for their input. In London: Kerry Albright, Craig Bardsley, Graham Brown-Martin, Julia Chandler, Nicholas ...
New mobile developments will also provide governments with tools to approach security and surveillance in new ways. ...
for future development goals. ...
doi:10.1108/oir-06-2015-0215
fatcat:v7mh5zonhrfahkg4qsnl5fowzm
Editorial: Security and Privacy in Internet of Things
2018
Journal on spesial topics in mobile networks and applications
Acknowledgements The guest editors are thankful to our reviewers for their effort in reviewing the manuscripts. We also thank the Editorin-Chief, Prof. ...
Dominika Belisova and Ms. Rolissa Atienza for their kind assistance during the whole process. J. M. de Fuentes, L. Gonzalez-Manzano and P. ...
privacy preservation. ...
doi:10.1007/s11036-018-1150-8
fatcat:omy7ul5qgjclvasgoxq7eq4dwy
Editorial: Second Quarter 2020 IEEE Communications Surveys and Tutorials
2020
IEEE Communications Surveys and Tutorials
a privacy-preserving manner. ...
and privacy-preservation, and increased efficiency. ...
YING-DAR LIN, Fellow, IEEE IEEE Distinguished Lecturer Editor-in-Chief IEEE COMMUNICATIONS SURVEYS AND TUTORIALS Distinguished Professor, National Chiao Tung University Hsinchu, Taiwan Director, Network ...
doi:10.1109/comst.2020.2992910
fatcat:33efyqb54jdthkbs5uhxivhnwu
Editorial: First Quarter 2019 IEEE Communications Surveys and Tutorials
2019
IEEE Communications Surveys and Tutorials
Accordingly, privacy preservation is now prevalent in census data products, social networks, location-based services and smart power grids. ...
These privacy issues have initiated a trend in research in which the goal is to allow individuals to use services by communicating strictly necessary information while preserving the privacy of individuals ...
doi:10.1109/comst.2019.2896498
fatcat:kxwyuhulqne37hbhzctwivcjsi
Editorial: Security and Privacy in Computing and Communications
2020
Journal on spesial topics in mobile networks and applications
With the advances in information systems and technologies, we are witnessing the advent of novel challenges on security and privacy in computing and communications for mobile devices, cloud and Internet ...
Editorial: The computing models and communication environments are changed tremendously because of the rapid development for real-world application. ...
The second article titled "Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet" provided a secure and efficient service retrieval scheme in cloud computing. ...
doi:10.1007/s11036-020-01683-4
fatcat:lf6rubtslbex5f2g2cku4ydy7i
Guest Editorial: Information and Communication Security in Multimedia Applications
2016
Multimedia tools and applications
different from communication networks in general. ...
Thus, currently, the communication research area is being closely connected with security issues such as wireless and mobile security, wireless traffic monitoring, wireless attack system, and so on. ...
mechanism instead of S-Box and permutation as in SP networks. ...
doi:10.1007/s11042-016-3827-y
fatcat:54ihhgrofzghlhr4fbjw4swwkq
Guest Editorial Software Defined Internet of Vehicles
2021
IEEE transactions on intelligent transportation systems (Print)
on intra-vehicle network, inter-vehicle network and vehicle mobile Internet, in accordance with the agreed communication protocols and data interaction standards. ...
Internet of Vehicles (IoV) is a large-scale system network for wireless communication and information exchange between vehicles and people, vehicles and roads, vehicles and the Internet, which is based ...
"Blockchain-based Trust Management Model for Location Privacy Preserving in VANET" proposes a blockchain-based trust management model for location privacy preserving. ...
doi:10.1109/tits.2021.3080875
fatcat:tvd6ubmtmfe73mta3iorxzncju
Editorial: Second Quarter 2019 IEEE Communications Surveys and Tutorials
2019
IEEE Communications Surveys and Tutorials
The paper distinguishes between the mobile social networks and the vehicular social networks and classifies the security and privacy issues on the basis of features. ...
In this context, the paper titled "Privacy-Preserving Content Dissemination for Vehicular Social Networks: Challenges and Solutions" by Xiaojie Wang, Zhaolong Ning, MengChu Zhou, Xiping Hu, Lei Wang, Yan ...
doi:10.1109/comst.2019.2913929
fatcat:j6zwztxl45cktgbz7ziudnaepi
« Previous
Showing results 1 — 15 out of 5,114 results