Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 119, Issue COct 2021
Publisher:
  • Elsevier North-Holland, Inc.
  • 655 Avenue of the Americas New York, NY
  • United States
ISSN:1383-7621
Bibliometrics
Skip Table Of Content Section
Research Papers
research-article
Improving Efficiency and Lifetime of Logic-in-Memory by Combining IMPLY and MAGIC Families
Abstract

Memristor-based memory computing has attracted much attention recently. By combining the storability and computability of memristor devices together, the memristor-based in-memory computing could break the so-called von Neumann ...

research-article
Self-secured devices: High performance and secure I/O access in TrustZone-based systems
Abstract

Arm TrustZone is a hardware technology that adds significant value to the ongoing security picture. TrustZone-based systems typically consolidate multiple environments into the same platform, requiring resources to be shared among ...

research-article
QBLKe: Host-side flash translation layer management for Open-Channel SSDs
Abstract

Open-Channel SSD (OCSSD) shows great potential in high-performance storage systems. Existing applications or file systems rely on host-based Flash Translation Layer (FTL) to use OCSSDs. However, the existing solution cannot fully ...

research-article
Edge based authentication protocol for vehicular communications without trusted party communication
Abstract

Vehicular networking allows vehicles with sensing capabilities to carry out communication from vehicle to vehicle or with accessible roadside units. To attain effective communication in vehicular networking, we have proposed a hybrid ...

research-article
Energy efficient EDF-VD-based mixed-criticality scheduling with shared resources
Abstract

In this paper, we consider simultaneously energy consumption and resource synchronization in mixed-criticality (MC) single processor systems. First, we give a feasibility analysis of single processor systems that execute real-time MC ...

research-article
DMSE: Dynamic Multi-keyword Search Encryption based on inverted index
Abstract

With the popularity of cloud storage, increasing people are willing to upload their files to cloud services. They will encrypt these files before uploading to protect the privacy of files. However, encryption makes effective search ...

research-article
FreqCounter: Efficient Cacheability of Encryption and Integrity Tree Counters in Secure Processors
Abstract

The data in the off-chip main memory can be potentially extracted or tampered by an adversary having physical access to the device and thus it becomes inevitable to secure the data present in the off-chip memory. The modern designs ...

research-article
An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks
Abstract

As the wave of data breaches continues crashing down on companies, specially for companies that provide cloud storage services, the data security and privacy have become the main concern of most clients that use this kind of services. ...

research-article
A scalable factory backbone for multiple independent time-sensitive networks
Abstract

Convergence of time-sensitive machine control networks as part of the operational technology (OT) with the ubiquitous information technology (IT) networks is an essential requirement for the ongoing digitalization of production. In ...

Reviews
review-article
A survey on data center cooling systems: Technology, power consumption modeling and control strategy optimization
Abstract

Data center is a fundamental infrastructure of computers and networking equipment to collect, store, process, and distribute huge amounts of data for a variety of applications such as Cyber–Physical–Social Systems, business enterprises ...

review-article
Accelerating DNNs from local to virtualized FPGA in the Cloud: A survey of trends
Abstract

Field-programmable gate arrays (FPGAs) are widely used locally to speed up deep neural network (DNN) algorithms with high computational throughput and energy efficiency. Virtualizing FPGA and deploying FPGAs in the cloud are becoming ...

Highlights

  • An overview of the main techniques used for accelerating DNNs on the FPGAs.
  • An ...

review-article
A survey of SRAM-based in-memory computing techniques and applications
Abstract

As von Neumann computing architectures become increasingly constrained by data-movement overheads, researchers have started exploring in-memory computing (IMC) techniques to offset data-movement overheads. Due to the widespread use of ...

Short Communication
rapid-communication
Security analysis of Pan et al.’s “Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability”
Abstract

Recently, Pan et al. proposed the “Public-Key Authenticated Encryption with Keyword Search Achieving both Multi-Ciphertext and Multi-Trapdoor Indistinguishability” in Pan and Li (2021). However, after carefully revisiting the scheme, ...

Special Issue on the 2020 IEEE Symposium on Real-Time and Distributed Computing (ISORC’20)
research-article
Combining admission tests for heuristic partitioning of real-time tasks on ARM big.LITTLE multi-processor architectures
Abstract

This paper tackles the problem of admitting real-time tasks on non-symmetric multiprocessor platforms, where partitioned EDF-FF is used. We extend the already obtained results for symmetric multiprocessor platforms and provide an ...

Special Issue on Trustworthiness and Privacy in Sensor-Cloud Systems
research-article
A flexible attribute based data access management scheme for sensor-cloud system
Abstract

Sensor-cloud combines the merits of WSN with cloud computing and has been deployed in many practical applications. Data security is the prerequisite for the implementation of a sensor-cloud system, but conventional security mechanisms ...

research-article
A lightweight verifiable trust based data collection approach for sensor–cloud systems
Abstract

A Lightweight Verifiable Trust based Data Collection (LVT-DC) approach is proposed to obtain credible data for mobile vehicles network, in which, a large number of IoT devices are deployed in smart city, and Mobile Vehicles (MVs) ...

research-article
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes
Abstract

With the extensive application of IoT techniques, IoT devices have become ubiquitous in daily lives. Meanwhile, attacks against IoT devices have emerged to compromise IoT devices by tampering with system pre-installed programs or ...

research-article
Secure Top-k query in edge-computing-assisted sensor-cloud systems
Abstract

Sensor cloud provides a new way for the owners of different WSNs (Wireless Sensor Networks) to share their data to other parties (users/organizations). The edge-computing-assisted sensor-cloud systems (EC-assisted SCSs) can even supply ...

research-article
Decentralized and expressive data publish-subscribe scheme in cloud based on attribute-based keyword search
Highlights

  • A decentralized and privacy-preserving data publish-subscribe scheme in cloud based on attribute-based keyword search with fine-grained access control and ...

Abstract

Data publish-subscribe scheme is a valuable approach to share and retrieve data from cloud platforms selectively. However, the common practice of standard encryption hinders the effective keyword-based data subscription over outsourced ...

Special issue on Reliable Software Technologies (AEiC2021)
research-article
Removing bias from the judgment day: A Ravenscar-based toolbox for quantitative comparison of EDF-to-RM uniprocessor scheduling
Abstract

Since 1973, Earliest Deadline First (EDF) uniprocessor scheduling has been known to be superior to its Rate Monotonic (Fixed-Priority, FPS) counterpart for its capacity to feasibly sustain full utilization, which FPS can only achieve ...

research-article
A case study for risk assessment in AR-equipped socio-technical systems
Abstract

Augmented Reality (AR) technologies are used as human–machine interface within various types of safety-critical systems. Several studies have shown that AR improves human performance. However, the introduction of AR might introduce ...

Special issue on Advances in Intelligent Systems and Smart Applications (SADASC20)
research-article
A security policy hardening framework for Socio-Cyber-Physical Systems
Abstract

Modern systems are heterogeneous inter-operating subsystems of different aspects that can be physical, technical, cybernetics, and even social like agent operators in smart grids or smart transportations. With the social dimension, we ...

Special issue on Dependability in IoT Systems/Apps/Tools and Applications (DependSys-IoT21)
research-article
Fair and size-scalable participant selection framework for large-scale mobile crowdsensing
Abstract

Mobile Crowdsensing (MCS) is a cost-efficient community sensing paradigm. It employs massive mobile computing devices such as smartphones to sense and propagate data collectively. Two main problems in MCS aiming to use these ...

Comments