By moving computing resources close to where they are needed (i.e., the network edges), edge computing can significantly reduce burden on the centric cloud data centers. However, extreme scale of on-line big data may impose a significant burden on the network backbones. Information-centric edge networking can address this challenge by incorporating in-network caching into edge networks. This however, opens a door for many new security issues and requires various security defenses. One of those is efficient access control design specifically for information-centric edge networking. In this work, we aim to design an efficient and secure access control scheme for information-centric edge networking. In our design, we propose the confidentialit...
Abstract Providing real-time communication services to mul-timedia applications and subscription-ba...
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can...
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data to edge node...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
The cloud computing paradigm provides numerous tempting advantages, enabling users to store and shar...
In order to solve the security problem of the data access between edge nodes in edge computing, in v...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
The oncoming data explosion of the Internet of Things, and in particular the Internet of Vehicles, h...
Named Data Networking (NDN) is a content-oriented future Internet architecture, which well suits the...
Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are...
We address the security vulnerabilities in existing protocols for network traffic authentication, by...
"The paper introduces confidential computing approaches focused on protecting hierarchical data with...
International audience<p>Named Data Networking (NDN) represents one of the major Information Centric...
Information-centric networking (ICN) is a Future Internet paradigm which uses named information (dat...
Abstract—This paper proposes a new edge-based authen-tication scheme for network coding. Many authen...
Abstract Providing real-time communication services to mul-timedia applications and subscription-ba...
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can...
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data to edge node...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
The cloud computing paradigm provides numerous tempting advantages, enabling users to store and shar...
In order to solve the security problem of the data access between edge nodes in edge computing, in v...
The concept of Internet of Things (IoT) has raised in the cloud computing paradigm as it adds latenc...
The oncoming data explosion of the Internet of Things, and in particular the Internet of Vehicles, h...
Named Data Networking (NDN) is a content-oriented future Internet architecture, which well suits the...
Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are...
We address the security vulnerabilities in existing protocols for network traffic authentication, by...
"The paper introduces confidential computing approaches focused on protecting hierarchical data with...
International audience<p>Named Data Networking (NDN) represents one of the major Information Centric...
Information-centric networking (ICN) is a Future Internet paradigm which uses named information (dat...
Abstract—This paper proposes a new edge-based authen-tication scheme for network coding. Many authen...
Abstract Providing real-time communication services to mul-timedia applications and subscription-ba...
Nowadays, the advance of smart grid technology has fostered the development of microgrids, which can...
Edge computing, as an extension of cloud computing, outsources encrypted sensitive data to edge node...