Proof-of-reputation based-consortium blockchain for trust resource sharing in internet of vehicles
Resource sharing among vehicles can highly improve the capability and efficiency of
Internet of Vehicles (IoV). However, it is challenging to establish trust and preserve privacy …
Internet of Vehicles (IoV). However, it is challenging to establish trust and preserve privacy …
[PDF][PDF] A review on data protection of cloud computing security, benefits, risks and suggestions
G Kumar - United International Journal for Research & …, 2019 - uijrt.com
While cloud computing is picking up notoriety, various security and protection issues are
developing that ruin the fast reception of this new computing worldview. What's more, the …
developing that ruin the fast reception of this new computing worldview. What's more, the …
[HTML][HTML] An overview on user profiling in online social networks
GU Vasanthakumar, K Sunithamma, PD Shenoy… - International Journal of …, 2017 - ijais.org
Abstract Advances in Online Social Networks is creating huge data day in and out providing
lot of opportunities to its users to express their interest and opinion. Due to the popularity …
lot of opportunities to its users to express their interest and opinion. Due to the popularity …
An approach for incremental mining of clickstream patterns as a service application
HM Huynh, B Vo, ZK Oplatková… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Sequential pattern mining in general and one particular form, clickstream pattern mining, are
data mining topics that have recently attracted attention due to their potential applications of …
data mining topics that have recently attracted attention due to their potential applications of …
Incremental clickstream pattern mining with search boundaries
HM Huynh, NN Pham, ZK Oplatkova, LTT Nguyen… - Information …, 2024 - Elsevier
Recently, there has been a growing interest in sequential pattern mining in data mining, with
a particular focus on clickstream pattern mining. These areas hold the potential for …
a particular focus on clickstream pattern mining. These areas hold the potential for …
Integrity authentication for SQL query evaluation on outsourced databases: A survey
Spurred by the development of cloud computing, there has been considerable recent
interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or …
interest in the Database-as-a-Service (DaaS) paradigm. Users lacking in expertise or …
Prelarge-based utility-oriented data analytics for transaction modifications in internet of things
The Internet of Things (IoT) environment includes things that exchange information using
data generated through sensors. The IoT technology can be executed efficiently by …
data generated through sensors. The IoT technology can be executed efficiently by …
Sentinels and twins: effective integrity assessment for distributed computation
SDC di Vimercati, S Foresti, S Jajodia… - … on Parallel and …, 2022 - ieeexplore.ieee.org
Distributed computing supports large scale and data-intensive computations with the
cooperation of a multitude of parties, each responsible for a portion of the workload. Such …
cooperation of a multitude of parties, each responsible for a portion of the workload. Such …
Efficient integrity verification of secure outsourced knn computation in cloud environments
H Rong, H Wang, J Liu, W Wu… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
With the ever increasing demand on computational and storage resources to deal with
tremendous growth of big data, clients tend to outsource their data mining tasks to cloud …
tremendous growth of big data, clients tend to outsource their data mining tasks to cloud …
Generalized proxy oblivious signature and its mobile application
SY Chiou, YX He - Security and Communication Networks, 2021 - Wiley Online Library
Oblivious signature ensures users select from the specified candidates. However, users can
choose only one candidate. This paper proposes a generalized oblivious signature scheme …
choose only one candidate. This paper proposes a generalized oblivious signature scheme …