Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Protect Applications and Data in Use in IoT Environment Using Collaborative Computing

    In IoT systems, traditional encryption can be used to protect IoT applications and data at rest or in transit that transforms data in to ciphertext making it unreadable. However, it is very challenging to prot...

    **ncai Peng, Li Shan Cang, Shuai Zhang in Collaborative Computing: Networking, Appli… (2024)

  2. No Access

    Article

    Data anonymization evaluation against re-identification attacks in edge storage

    Edge storage is driven by the emerging edge computing and application intelligence, which makes the data anonymization become essential to guarantee the security of the data. The risk with data anonymization i...

    Minghui Chen, Li Shan Cang, Zheng Chang, Muddesar Iqbal in Wireless Networks (2023)