2020
DOI: 10.1002/int.22337
|View full text |Cite
|
Sign up to set email alerts
|

ImpSuic: A quality updating rule in mixing coins with maximum utilities

Abstract: vMixing coins strategy can realize the anonymity of user information, thereby protecting the user's privacy. Ideally, the blacklist is public information and all bad coins are recorded in it. However, due to the failure of some bad

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 22 publications
(29 citation statements)
references
References 19 publications
0
28
0
Order By: Relevance
“…These studies considered geographically distributed cloud data centers and applied workload migration techniques to minimize the energy of running tasks inside the system. Dynamic application partitioning with failure and resource constraint-enabled schemes were suggested in these studies [21][22][23][24][25][26][27]. The studies considered fine-grained and coarse-grained healthcare workloads in their models.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
See 4 more Smart Citations
“…These studies considered geographically distributed cloud data centers and applied workload migration techniques to minimize the energy of running tasks inside the system. Dynamic application partitioning with failure and resource constraint-enabled schemes were suggested in these studies [21][22][23][24][25][26][27]. The studies considered fine-grained and coarse-grained healthcare workloads in their models.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
“…To the best of our knowledge, dynamic application partitioning and task scheduling of biosensor healthcare workflow in secure mobile edge clouds has not been studied yet. Closely related studies [1,3,5,9,[21][22][23][24][25][26][27] have focused on dynamic application partitioning and minimizing the energy use of mobile devices. These studies only considered bandwidth and resource constraints.…”
Section: Security Schemes In Application Partitioningmentioning
confidence: 99%
See 3 more Smart Citations