Skip to main content

and
  1. No Access

    Article

    Cost optimization of cloud-edge-fog federated systems with bidirectional offloading: one-hop versus two-hop

    Edge and fog computing technologies are akin to cloud computing but operate in closer proximity to users, offering similar services on a more widely distributed and localized scale. To enhance the computing en...

    Bo-Shiuan Lin, Binayak Kar, Tai-Lin Chin, Ying-Dar Lin in Telecommunication Systems (2023)

  2. No Access

    Chapter and Conference Paper

    Authentication of Real-Time Communication System Using KIS Scheme

    In global communication environment, signature computation will be frequently performed on a relatively insecure device that cannot be trusted all times to maintain the secrecy of the private key. To deal with...

    Binayak Kar, Eric Hsiao-kuang Wu in Advanced Technologies, Embedded and Multim… (2014)