2022
DOI: 10.1016/j.matpr.2021.05.593
|View full text |Cite
|
Sign up to set email alerts
|

Quantum cryptography technique: A way to improve security challenges in mobile cloud computing (MCC)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…Maray et al [8] present the concept of offloading techniques on mobile edge technology (MEC), along with previous work on taxonomy architecture and previous algorithms that provide different computing services on MCC, with a comparison between MCC and MEC, and its future directions. Abidin et al [9] present modern quantum cryptography direction (QKD) and service provider architectures with the comparison of other previous work techniques for the betterment of the security of MCC. Ali et al [10] proposed dynamic decision task scheduling and a micro-service-based computational offloading (TSMCO) technique for mobile cloud servers and presented architecture or algorithms for the enhancement of TSMCO framework on different applications, such as health care, games, and augmented reality.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Maray et al [8] present the concept of offloading techniques on mobile edge technology (MEC), along with previous work on taxonomy architecture and previous algorithms that provide different computing services on MCC, with a comparison between MCC and MEC, and its future directions. Abidin et al [9] present modern quantum cryptography direction (QKD) and service provider architectures with the comparison of other previous work techniques for the betterment of the security of MCC. Ali et al [10] proposed dynamic decision task scheduling and a micro-service-based computational offloading (TSMCO) technique for mobile cloud servers and presented architecture or algorithms for the enhancement of TSMCO framework on different applications, such as health care, games, and augmented reality.…”
Section: Literature Reviewmentioning
confidence: 99%
“…TOPSIS method of ranking evaluated based on enhanced ambiguity comparison with weighted average. One of the typical approaches Multiple response in the process used in TOPSIS to improve problems, reduce uncertainty can be used as a performance measurement index determining the weight of each response and manageable at the same time A global approach continuously [11]. The TOPSIS process is an advanced and simple ranking engine used.…”
Section: Topsismentioning
confidence: 99%
“…For the security estimation, let's share one mystery bit if they decide the function by getting a reasonable estimation result. The existence of share made the entangled state fully destroyed into a separable state [26].…”
Section: B Alternativesmentioning
confidence: 99%