We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication

    Over the last decade, millions of 4G and 5G-enabled mobile devices have become part of the Internet. Almost, all the applications have been shifted...

    Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf in The Journal of Supercomputing
    Article 25 April 2023
  2. On Verifying Unbounded Client-Server Systems

    Formal verification of Petri nets is well studied and there are existing state-of-the-art verification tools such as KREACH [5], Petrinizer [6],...
    Tephilla Prince in Multi-Agent Systems
    Conference paper 2023
  3. DCM: Dynamic Client-Server Code Migration

    The underlying Client/Server architecture of the Web inherently raises the question of the distribution of application logic between client and...
    Sebastian Heil, Martin Gaedke in Web Engineering
    Conference paper 2023
  4. Federated Unlearning and Server Right to Forget: Handling Unreliable Client Contributions

    In the context of federated learning, the concept of federated unlearning has emerged, aiming to realize the “right to be forgotten”. The current...
    Hasin Bano, Muhammad Ameen, ... Pengfei Wang in Recent Trends in Image Processing and Pattern Recognition
    Conference paper 2024
  5. FLCP: federated learning framework with communication-efficient and privacy-preserving

    Within the federated learning (FL) framework, the client collaboratively trains the model in coordination with a central server, while the training...

    Wei Yang, Yuan Yang, ... Wei **ang in Applied Intelligence
    Article Open access 27 May 2024
  6. Unbalanced private set intersection with linear communication complexity

    The private set intersection (PSI) protocol allows two parties holding a set of integers to compute the intersection of their sets without revealing...

    Quanyu Zhao, Bingbing Jiang, ... Sheng Zhong in Science China Information Sciences
    Article 05 February 2024
  7. Performance assessment and comparison of lightweight D2D-IoT communication protocols over resource constraint environment

    The Internet of Things (IoT) based smart strategies are often resource constrained with respect to energy, computation and memory. Outdated...

    Manasi Mishra, S. R. N. Reddy in Multimedia Tools and Applications
    Article 26 January 2024
  8. Rotation Key Reduction for Client-Server Systems of Deep Neural Network on Fully Homomorphic Encryption

    In this paper, we propose a new concept of hierarchical rotation key for homomorphic encryption to reduce the burdens of the clients and the server...
    Joon-Woo Lee, Eunsang Lee, ... Jong-Seon No in Advances in Cryptology – ASIACRYPT 2023
    Conference paper 2023
  9. Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime

    Pairings are important building blocks in many public-key cryptosystems. Delegation of a pairing computation e(A, B) from a computationally weaker...
    Giovanni Di Crescenzo, Matluba Khodjaeva, Dilan D. Morales Caro in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  10. Communication-efficient clustered federated learning via model distance

    Clustered Federated Learning (CFL) leverages the differences among data distributions on clients to partition all clients into several clusters for...

    Mao Zhang, Tie Zhang, ... Linli Xu in Machine Learning
    Article 17 January 2024
  11. Public key versus symmetric key cryptography in client–server authentication protocols

    Every month, several new protocols are pop** up, comparing themselves with a few others and claiming to outperform the whole state of the art. The...

    Article 08 March 2021
  12. A Comparison of Publish-Subscribe and Client-Server Models for Streaming IoT Telemetry Data

    In recent years, the Internet of Things (IoT) has become a household name both in research and commercial domains. There are numerous practical...
    Olasupo Ajayi, Antoine Bagula, ... Moegammad Damon in Emerging Technologies for Develo** Countries
    Conference paper 2023
  13. Client and Server Support

    The html package provides functions for processing HTTP requests. The Go template packages provide templates for generating text output with value...
    Barry Feigenbaum, Ph.D. in Go for Java Programmers
    Chapter 2022
  14. High-performance microservice differentiated domain communication technology

    Microservice architecture splits the traditional monolithic application into different small services. Differences in programming language and data...

    Lei Zhang, Ke Pang, Jiangtao Xu in Computing
    Article 13 January 2024
  15. Communication-Efficient Distributed Minimax Optimization via Markov Compression

    Recently, the minimax problem has attracted a lot of attention due to its wide applications in modern machine learning fields such as GANs. With the...
    Linfeng Yang, Zhen Zhang, ... Suyang Wang in Neural Information Processing
    Conference paper 2024
  16. Sensing-aided peer-to-peer millimeter-wave communication

    One of the bottlenecks of modern communications is to enable sensing and mutual communication simultaneously without causing scheduling conflicts,...

    **angyu Li, Sidong Guo, Shez Malik in International Journal of Information Technology
    Article 17 March 2024
  17. Communication efficiency optimization of federated learning for computing and network convergence of 6G networks

    Federated learning effectively addresses issues such as data privacy by collaborating across participating devices to train global models. However,...

    Yizhuo Cai, Bo Lei, ... **ng Zhang in Frontiers of Information Technology & Electronic Engineering
    Article 01 May 2024
  18. An Improved Authentication Scheme for V2I Communication

    In the rapid growth of automated transportation systems Vehicle to Infrastructure (V2I) communication is growing in significance to guarantee the...

    D. Suresh, Prashant V. Joshi, ... K. M. Sudharshan in SN Computer Science
    Article 10 May 2024
  19. Anomaly detection and defense techniques in federated learning: a comprehensive review

    In recent years, deep learning methods based on a large amount of data have achieved substantial success in numerous fields. However, with increases...

    Chang Zhang, Shunkun Yang, ... Huansheng Ning in Artificial Intelligence Review
    Article Open access 23 May 2024
  20. Federated Dynamic Client Selection for Fairness Guarantee in Heterogeneous Edge Computing

    Federated learning has emerged as a distributed learning paradigm by training at each client and aggregating at a parameter server. System...

    Ying-Chi Mao, Li-Juan Shen, ... Jie Wu in Journal of Computer Science and Technology
    Article 30 January 2024
Did you find what you were looking for? Share feedback.