![](https://dblp.org/img/logo.ua.320x120.png)
![](https://dblp.org/img/dropdown.dark.16x16.png)
![](https://dblp.org/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Future Generation Computer Systems, Volume 84
Volume 84, July 2018
- Changxi Liu
, Hailong Yang, Rui Wang, Zhongzhi Luan, Depei Qian:
T1000: Mitigating the memory footprint of convolution neural networks with decomposition and re-fusion. 1-10 - Shridhar G. Domanal
, G. Ram Mohana Reddy:
An efficient cost optimized scheduling for spot instances in heterogeneous cloud environment. 11-21 - Adrián Castelló
, Rafael Mayo
, Kevin Sala
, Vicenç Beltran
, Pavan Balaji, Antonio J. Peña
:
On the adequacy of lightweight thread approaches for high-level parallel programming models. 22-31 - Yahya Hassanzadeh-Nazarabadi
, Alptekin Küpçü
, Öznur Özkasap
:
Decentralized and locality aware replication method for DHT-based P2P storage systems. 32-46 - Dariush Abbasinezhad-Mood
, Morteza Nikooghadam
:
Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications. 47-57 - Bin Li
, Qinglei Zhou, Xueming Si:
Mimic computing for password recovery. 58-77 - Falak Nawaz, Naeem Khalid Janjua
, Omar Khadeer Hussain
, Farookh Khadeer Hussain, Elizabeth Chang
, Morteza Saberi
:
Event-driven approach for predictive and proactive management of SLA violations in the Cloud of Things. 78-97 - Huixi Li, Wenjun Li, Haodong Wang
, Jianxin Wang:
An optimization of virtual machine selection and placement by using memory content similarity for server consolidation in cloud. 98-107 - Troy C. Kohwalter
, Leonardo Murta
, Esteban Clua:
Filtering irrelevant sequential data out of game session telemetry though similarity collapses. 108-122
- Pandi Vijayakumar
, Victor Chang
, L. Jegatha Deborah
, Bharat S. Rawal Kshatriya:
Key management and key distribution for secure group communication in mobile and cloud network. 123-125 - Zitao Chen, Wei Ren
, Yi Ren, Kim-Kwang Raymond Choo
:
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions. 126-138 - Muhammad Al-Qurishi, Sk. Md. Mizanur Rahman
, M. Shamim Hossain
, Ahmad Almogren
, Majed A. AlRubaian, Atif Alamri, Mabrook Al-Rakhami
, Brij B. Gupta
:
An efficient key agreement protocol for Sybil-precaution in online social networks. 139-148 - Xiong Li
, Fan Wu, Muhammad Khurram Khan
, Lili Xu, Jian Shen
, Minho Jo
:
A secure chaotic map-based remote authentication scheme for telecare medicine information systems. 149-159 - Yang Yang, Xianghan Zheng, Ximeng Liu, Shangping Zhong, Victor Chang
:
Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system. 160-176 - Yukun Zhou, Dan Feng, Yu Hua, Wen Xia, Min Fu, Fangting Huang, Yucheng Zhang:
A similarity-aware encrypted deduplication scheme with flexible access control in the cloud. 177-189 - Cheng Guo, Ningqi Luo
, Md. Zakirul Alam Bhuiyan
, Yingmo Jie, Yuanfang Chen, Bin Feng, Muhammad Alam:
Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. 190-199 - Rifaqat Ali
, Arup Kumar Pal, Saru Kumari
, Marimuthu Karuppiah
, Mauro Conti:
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring. 200-215 - SK Hafizul Islam, Mohammad S. Obaidat
, Pandi Vijayakumar
, Enas W. Abdulhay, Fagen Li, M. Krishna Chaitanya Reddy
:
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. 216-227 - Xin Su, Aniello Castiglione
, Christian Esposito
, Chang Choi
:
Power domain NOMA to support group communication in public safety networks. 228-238 - Qi Feng, Debiao He, Sherali Zeadally, Huaqun Wang:
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. 239-251
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.