Showing 1 - 20 results of 35 for search 'edge computing security', query time: 0.06s Refine Results
  1. 1

    A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid by Cong Wang (107450)

    Published 2023
    “…The proposed scheme can guarantee the security of the communication and provide anonymity for both the edge server and the smart meters. …”
  2. 2

    Security Assessment of Low-Resource Edge Devices for IoT Systems by Shapsough, Shams Eddeen Yousef

    Published 2020
    “…A Master of Science thesis in Computer Engineering by Shams Eddeen Yousef Shapsough entitled, “Security Assessment of Low-Resource Edge Devices for Iot Systems”, submitted in April 2020. …”
    Get full text
    doctoralThesis
  3. 3
  4. 4

    A Survey on Mobile Edge Computing for Video Streaming: Opportunities and Challenges by Muhammad Asif Khan (7367468)

    Published 2022
    “…., ultra high definition video conferencing, 3D and multiview video streaming, crowd-sourced video streaming, cloud gaming, virtual and augmented reality) are becoming more ambitious with high volume and low latency video streams putting strict demands on the already congested networks. Mobile Edge Computing (MEC) is an emerging paradigm that extends cloud computing capabilities to the edge of the network i.e., at the base station level. …”
  5. 5
  6. 6

    A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices by Bhanpurawala, Alifiya

    Published 2023
    “…A Master of Science thesis in Computer Engineering by Alifiya Bhanpurawala entitled, “A Formal Assisted Approach for Modeling and Testing Security Attacks in IoT Edge Devices”, submitted in November 2023. …”
    Get full text
    doctoralThesis
  7. 7
  8. 8

    A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading by Dbouk, Toufic

    Published 2019
    “…Moreover, the results provide optimal offloading decision and distribution of security services while significantly reducing energy consumption, execution time, and number of selected computational nodes without sacrificing security.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  9. 9

    Editorial on the Special Section on Algorithms, Circuits, and Systems for Signal Processing at the Edge by Leonel Sousa (19645372)

    Published 2021
    “…The requirement for computations at the edge are very stringent in terms of security, bandwidth, computational speed, latency and power consumption. …”
  10. 10
  11. 11

    Collaborative Federated Learning for Healthcare: Multi-Modal COVID-19 Diagnosis at the Edge by Adnan Qayyum (16875936)

    Published 2022
    “…In this paper, we leverage the capabilities of edge computing in medicine by evaluating the potential of intelligent processing of clinical data at the edge. …”
  12. 12
  13. 13

    A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT by Dhananjay Bisen (19482454)

    Published 2023
    “…<p dir="ltr">In mobile edge computing (MEC), it is difficult to recognise an optimum solution that can perform in limited energy by selecting the best communication path and components. …”
  14. 14
  15. 15

    O-Cloud Security: A Comprehensive Survey of Threats, Mitigation Strategies, and Future Directions by Muhammad J. Shehab (16905174)

    Published 2025
    “…However, while the O-Cloud offers significant advantages in scalability and efficiency, it also introduces unique security challenges, integrating a whole paradigm of telecom and cloud computing. …”
  16. 16

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…However, despite the significant impact of AI design on human interests, the security and trustworthiness of edge AI applications are not foolproof and ethicalneither foolproof nor ethical; Moreover, social norms are often ignored duringin the design, implementation, and deployment of edge AI systems. …”
  17. 17
  18. 18
  19. 19

    Towards Building a Secure Blockchain-Based Architecture for Internet of Things (IoT) by Pavithran, Deepa

    Published 2020
    “…The proposed architecture uses edge and cloudlet computing paradigm as well as HIBE to preserve privacy. …”
    Get full text
  20. 20