2017
DOI: 10.1109/jiot.2017.2659783
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
109
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 214 publications
(110 citation statements)
references
References 41 publications
0
109
0
1
Order By: Relevance
“…For example, whether two individuals in a social network have a close relationship may be expected to be kept a secret. Therefore, privacy concerns have been raised in increasingly emerging technologies [2][3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…For example, whether two individuals in a social network have a close relationship may be expected to be kept a secret. Therefore, privacy concerns have been raised in increasingly emerging technologies [2][3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…Security threats that can occur in an IoT environment include those in existing ICT environments. Confidentiality, integrity, and availability (CIA) are often seen as threats to the provision and use of legitimate services and are the three main components of information security [11].…”
Section: Introductionmentioning
confidence: 99%
“…The recent evolution in information technology, such as 5G, Internet of Things, and big data [1][2][3], is promoting the growing and dynamic demands on bandwidth and capacity of optical data transmission. With the limited bandwidth provided by electrical devices, exploiting polarization multiplexing and higher-order modulation formats, for instance, 16QAM and 64QAM can increase the spectrum efficiency of transmission systems [4][5][6].…”
Section: Introductionmentioning
confidence: 99%