Editorial Board
Exploring the relationship between architectures and management policies in the design of NUCA-based chip multicore systems
Scalable parallel simulation of dynamical processes on large stochastic Kronecker graphs
An integrated information lifecycle management framework for exploiting social network data to identify dynamic large crowd concentration events in smart cities applications
An SVM-based collaborative filtering approach for Top-N web services recommendation
Internet of Things security and forensics: Challenges and opportunities
Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems
Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix
Proactive defense mechanisms for the software-defined Internet of Things with non-patchable vulnerabilities
A foggy research future: Advances and future opportunities in fog computing research
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges
A variant of password authenticated key exchange protocol
Anonymous and secure aggregation scheme in fog-based public cloud computing
Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing
CCA-secure ABE with outsourced decryption for fog computing
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
An efficient access control scheme with outsourcing capability and attribute update for fog computing
Towards leakage-resilient fine-grained access control in fog computing
Verifiable searchable encryption with aggregate keys for data sharing system
Privacy preserving cloud data auditing with efficient key update
Position based cryptography with location privacy: A step for Fog Computing
Controlling and filtering users data in Intelligent Transportation System
Secure intelligent traffic light control using fog computing
Hybrid privacy-preserving clinical decision support system in fog–cloud computing
Universal and secure object ownership transfer protocol for the Internet of Things
Bitcoin-based fair payments for outsourcing computations of fog devices
Privacy-preserved big data analysis based on asymmetric imputation kernels and multiside similarities
Internet-of-Things and big data for smarter healthcare: From device to architecture, applications and analytics
Power transmission and workload balancing policies in eHealth mobile cloud computing scenarios
CUIDATS: An RFID–WSN hybrid monitoring system for smart health care environments
Unobtrusive detection of body movements during sleep using Wi-Fi received signal strength with model adaptation technique
A reliable IoT system for Personal Healthcare Devices
Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach
Towards fog-driven IoT eHealth: Promises and challenges of IoT in medicine and healthcare