Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things
Face identification and resolution technology is crucial to ensure the identity consistency of
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …
Fog computing based face identification and resolution scheme in internet of things
The identification and resolution technology are the prerequisite for realizing identity
consistency of physical-cyber space mapping in the Internet of Things (IoT). Face, as a …
consistency of physical-cyber space mapping in the Internet of Things (IoT). Face, as a …
A unified face identification and resolution scheme using cloud computing in Internet of Things
Abstract In the Internet of Things (IoT), identification and resolution of physical object is
crucial for authenticating object's identity, controlling service access, and establishing trust …
crucial for authenticating object's identity, controlling service access, and establishing trust …
Design of secure key management and user authentication scheme for fog computing services
Fog computing (fog networking) is known as a decentralized computing infrastructure in
which data, applications, compute as well as data storage are scattered in the most logical …
which data, applications, compute as well as data storage are scattered in the most logical …
Lightweight and secure authentication scheme for IoT network based on publish–subscribe fog computing model
Abstract The Internet of Things (IoT) has converged with Cloud computing to provide
comprehensive services to users in different places. However, with the exponential growth of …
comprehensive services to users in different places. However, with the exponential growth of …
A secure authenticated and key exchange scheme for fog computing
Fog computing architecture is used in various environments such as smart manufacturing,
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …
vehicular ad hoc networks. However, as an extension of cloud computing, inheriting security …
Fog-centric authenticated key agreement scheme without trusted parties
Y Guo, Z Zhang, Y Guo - IEEE Systems Journal, 2020 - ieeexplore.ieee.org
Fog computing can effectively provide a variety of application support for the fast-growing
number of Internet of Things devices. However, the unique characteristics of fog computing …
number of Internet of Things devices. However, the unique characteristics of fog computing …
Improved authenticated key agreement scheme for fog‐driven IoT healthcare system
TY Wu, T Wang, YQ Lee, W Zheng… - Security and …, 2021 - Wiley Online Library
The Internet of things (IoT) has been widely used for various applications including medical
and transportation systems, among others. Smart medical systems have become the most …
and transportation systems, among others. Smart medical systems have become the most …
Data security and privacy in fog computing
Cloud computing is now a popular computing paradigm that can provide end users access
to configurable resources on any device, from anywhere, at any time. During the past years …
to configurable resources on any device, from anywhere, at any time. During the past years …
An identity-based encryption scheme for data security in fog computing
Fog computing provides better integration facilities between cloud computing and Internet of
things with real-time interactions. It delivers faster computing functionalities sitting close to …
things with real-time interactions. It delivers faster computing functionalities sitting close to …
相关搜索
- face identification resolution scheme
- face identification fog computing
- face identification privacy preservation
- fog computing privacy preservation
- privacy preservation internet of things
- fog computing encryption scheme
- fog computing ciphertext update
- cloud computing internet of things
- fog computing computation outsourcing
- agreement scheme trusted parties
- face identification internet of things
- fog computing internet of things
- face identification cloud computing
- fog computing exchange scheme
- resolution scheme internet of things
- computation outsourcing internet of things