• Publications
  • Influence
Factors affecting response rates of the web survey: A systematic review
TLDR
We developed a conceptual model of the web survey process and use the model to systematically review a wide variety of factors influencing the response rate in the stage of survey development, survey delivery, survey completion, and survey return. Expand
  • 982
  • 50
A survey on trust management for Internet of Things
TLDR
We investigate the properties of trust, propose objectives of IoT trust management, and provide a survey on the current literature advances towards trustworthy IoT. Expand
  • 758
  • 24
  • PDF
From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework
TLDR
Fog computing, an extension of cloud computing services to the edge of the network to decrease latency and network congestion, is a relatively recent research trend. Expand
  • 189
  • 9
  • PDF
Age differences in children's understanding of the complexity of the Internet
Abstract This study examined differences in understanding the technical and social complexity of the Internet across four age groups, 5–8-year-olds, 9–10-year-olds, 11–12-year-olds, and adults. TheExpand
  • 59
  • 9
Trust Modeling and Management: From Social Trust to Digital Trust
TLDR
This chapter introduces trust modeling and trust management as a means of managing trust in digital systems. Expand
  • 121
  • 7
Trust Evaluation Based Security Solution in Ad Hoc Networks
TLDR
A trust evaluation based security solution is proposed to provide effective security decision on data protection, secure routing and other network activities. Expand
  • 199
  • 5
  • PDF
LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey
TLDR
We review the security data collection and data analysis methods in terms of various attacks in order to provide the basis of security measurement in the LTE/LTE-A network. Expand
  • 29
  • 5
  • PDF
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications
TLDR
We proposed a Universal Authentication and Key Agreement protocol for D2D communications (UAKA-D2D) to achieve secure communication session establishment, where user roaming and inter-operator operation are considered. Expand
  • 28
  • 5
Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications
TLDR
We propose two privacy-preserving authentication and key agreement protocols for group D2D communications. Expand
  • 32
  • 5
A Survey on C-RAN Security
TLDR
We provide a thorough review on the existing security studies in the field of C-RAN based on its three logic layers and corresponding security threats and attacks. Expand
  • 29
  • 5
...
1
2
3
4
5
...