2017
DOI: 10.1007/s00500-017-2486-x
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary trust scheme of certificate game in mobile cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…In order to verify the authenticity of the above three scenarios, this study uses MATLAB R2021a software to simulate and analyze each parameter. Although the setting of the initial value of the parameter affects its evolution range and speed to a certain extent, it will not change its overall trend and results [54,55]. The most important thing is the accuracy of the model establishment and the practicality of the model, which aims to reveal the regular characteristics of things changing [56].…”
Section: Experimental Data and Simulationmentioning
confidence: 99%
“…In order to verify the authenticity of the above three scenarios, this study uses MATLAB R2021a software to simulate and analyze each parameter. Although the setting of the initial value of the parameter affects its evolution range and speed to a certain extent, it will not change its overall trend and results [54,55]. The most important thing is the accuracy of the model establishment and the practicality of the model, which aims to reveal the regular characteristics of things changing [56].…”
Section: Experimental Data and Simulationmentioning
confidence: 99%
“…1 Encryption [21,76,55,25,26,65,28,29,30,31,66,34,7,79,90,40,91,42,74,59,44,45,46,47,60,87,50,51,81,52,53,93,83,54,61] 2 Authentication [22,63,64,32,33,67,68,69,35,70,41,57,43,71,72,75,48,49,…”
Section: # Solutionsmentioning
confidence: 99%
“…Time consumption [21,55,22,24,63,26,27,29,31,66,33,34,67,68,37,7,38,39,40,41,42,57,71,58,59,75,44,47,48,49,51,88] Communication overhead [24,64,65,32,66,33,67,68,36,7,91,85,86,41,56,42,57,71,58,75,49,…”
Section: Resources Usage Metricsmentioning
confidence: 99%
“…Many prior research efforts have been conducted to address the privacy and security threats. In light of the growing privacy concerns in MCC, Li et al [78] proposed a certificate-aware framework for online access control systems, where users were compensated for their privacy certificate and operation disclosure and were motivated to present more certificate information. Au et al [16] provided an overview towards the mobile cloud privacy threats from different levels, such as information theft and data integrity breakage.…”
Section: Security and Privacy Preserving For Mobile Cloud Healthcarementioning
confidence: 99%