[HTML][HTML] Analysis of the implementation of urban computing in smart cities: A framework for the transformation of Saudi cities
HM Alshuwaikhat, YA Aina, L Binsaedan - Heliyon, 2022 - cell.com
Smart city development is gaining widespread acceptance as a means of mitigating urban
development problems. However, the implementation of smart cities faces challenges …
development problems. However, the implementation of smart cities faces challenges …
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …
and control across heterogeneous network a reality, and has good prospects in industrial …
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …
wearable equipments are able to become new intelligent terminals to provide services for …
Anonymous and traceable group data sharing in cloud computing
Group data sharing in cloud environments has become a hot topic in recent decades. With
the popularity of cloud computing, how to achieve secure and efficient data sharing in cloud …
the popularity of cloud computing, how to achieve secure and efficient data sharing in cloud …
An efficient centroid-based routing protocol for energy management in WSN-assisted IoT
Wireless sensor networks (WSNs) distribute hundreds to thousands of inexpensive
microsensor nodes in their regions, and these nodes are important parts of Internet of Things …
microsensor nodes in their regions, and these nodes are important parts of Internet of Things …
Dynamic resource allocation for load balancing in fog environment
Fog computing is emerging as a powerful and popular computing paradigm to perform IoT
(Internet of Things) applications, which is an extension to the cloud computing paradigm to …
(Internet of Things) applications, which is an extension to the cloud computing paradigm to …
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment
With the increasing popularity of service computing paradigm, tremendous resources or
services are emerging rapidly on the Web, imposing heavy burdens on the service selection …
services are emerging rapidly on the Web, imposing heavy burdens on the service selection …
Privacy-preserving quality prediction for edge-based IoT services
Abstract Quality of Service (QoS) prediction and privacy preservation are two key challenges
in service recommendation. Nevertheless, the existing QoS prediction methods cannot be …
in service recommendation. Nevertheless, the existing QoS prediction methods cannot be …