Search alternatives:
correction algorithm » detection algorithm (Expand Search), selection algorithm (Expand Search), compression algorithms (Expand Search)
server correction » error correction (Expand Search), vertex correction (Expand Search), scatter correction (Expand Search)
correction algorithm » detection algorithm (Expand Search), selection algorithm (Expand Search), compression algorithms (Expand Search)
server correction » error correction (Expand Search), vertex correction (Expand Search), scatter correction (Expand Search)
-
1
Edge server registration phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
2
Network model.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
3
Comparative Analysis (Performance Metrics).
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
4
SN/IoT or user registration phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
5
Communication costs in bits.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
6
Communication costs.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
7
Mutual authentication phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
8
Notations used and their descriptions.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
9
Comparative Analysis (Security Functionalities).
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
10
Storage Cost of the Proposed Protocol.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
11
Comparison with existing work.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
12
Registration phase.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
13
Performance comparison of different ML models.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
14
Classification Report for the proposed model.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
15
ROC curve of the proposed model.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
16
Fog-IoT architecture.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
17
Computational cost of the proposed approach.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
18
Confusion Matrix of different ML models.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
19
Performance metrics of applied ML models.
Published 2025“…<div><p>Authentication is a critical challenge in fog computing security, especially as fog servers provide services to many IoT users. The conventional authentication process often requires disclosing sensitive personal information, such as usernames, emails, mobile numbers, and passwords that end users are reluctant to share with intermediary services (i.e., Fog servers). …”
-
20
An Ecological Benchmark of Photo Editing Software: A Comparative Analysis of Local vs. Cloud Workflows
Published 2025“…Experimental Methodology Framework Local Processing Pipeline Architecture Data Flow: Storage I/O → Memory Buffer → CPU/GPU Processing → Cache Coherency → Storage I/O ├── Input Vector: mmap() system call for zero-copy file access ├── Processing Engine: OpenMP parallelization with NUMA-aware thread affinity ├── Memory Management: Custom allocator with hugepage backing └── Output Vector: Direct I/O bypassing kernel page cache Cloud Processing Pipeline Architecture Data Flow: Local Storage → Network Stack → TLS Tunnel → CDN Edge → Origin Server → Processing Grid → Response Pipeline ├── Upload Phase: TCP window scaling with congestion control algorithms ├── Network Layer: Application-layer protocol with adaptive bitrate streaming ├── Server-side Processing: Containerized microservices on Kubernetes orchestration ├── Load Balancing: Consistent hashing with geographic affinity routing └── Download Phase: HTTP/2 multiplexing with server push optimization Dataset Schema and Semantic Structure Primary Data Vectors Field Data Type Semantic Meaning Measurement Unit test_type Categorical Processing paradigm identifier {local_processing, cloud_processing} photo_count Integer Cardinality of input asset vector Count avg_file_size_mb Float64 Mean per-asset storage footprint Mebibytes (2^20 bytes) total_volume_gb Float64 Aggregate data corpus size Gigabytes (10^9 bytes) processing_time_sec Integer Wall-clock execution duration Seconds (SI base unit) cpu_usage_watts Float64 Thermal design power consumption Watts (Joules/second) ram_usage_mb Integer Peak resident set size Mebibytes network_upload_mb Float64 Egress bandwidth utilization Mebibytes energy_consumption_kwh Float64 Cumulative energy expenditure Kilowatt-hours co2_equivalent_g Float64 Carbon footprint estimation Grams CO₂e test_date ISO8601 Temporal execution marker RFC 3339 format hardware_config String Node topology identifier Alphanumeric encoding Statistical Distribution Characteristics The dataset exhibits non-parametric distribution patterns with significant heteroscedasticity across computational load vectors. …”