Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cloud computing (2)
- Energy efficient mobility (1)
- Human-centric Sensing (1)
- Identity-based signature (1)
- Intelligent mobility (1)
-
- Internet of Things (1)
- Mobility management (1)
- Mobility prediction (1)
- Mobility security (1)
- Opportunistic Sensing (1)
- Outsourcing (1)
- Participatory Sensing (1)
- Privacy protection (1)
- Revocation (1)
- SDN (1)
- Security (1)
- Software-defined network (1)
- Ubiquitous Sensing (1)
- Wireless mobile networks (1)
Articles 1 - 3 of 3
Full-Text Articles in Physical Sciences and Mathematics
A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
A Brief Overview Of Intelligent Mobility Management For Future Wireless Mobile Networks, Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song
Information Science Faculty Publications
No abstract provided.
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Investigating Security For Ubiquitous Sensor Networks, Alfredo J. Perez, Sherali Zeadally, Nafaa Jabeur
Information Science Faculty Publications
The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network paradigm which is providing various types of solutions to the community and the individual user in various sectors including environmental monitoring, entertainment, transportation, security, and healthcare. We explore and compare the features of wireless sensor networks and ubiquitous sensor networks and based on the differences between these two types of systems, we classify the security-related challenges of ubiquitous sensor networks. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges that need to be addressed …
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Efficient Revocable Id-Based Signature With Cloud Revocation Server, Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li
Information Science Faculty Publications
Over the last few years, identity-based cryptosystem (IBC) has attracted widespread attention because it avoids the high overheads associated with public key certificate management. However, an unsolved but critical issue about IBC is how to revoke a misbehaving user. There are some revocable identity-based encryption schemes that have been proposed recently, but little work on the revocation problem of identity-based signature has been undertaken so far. One approach for revocation in identity-based settings is to update users' private keys periodically, which is usually done by the key generation center (KGC). But with this approach, the load on the KGC will …