Network-Based Secret Communication in Clouds: A Survey (English)
- New search for: Ullrich, Johanna
- New search for: Zseby, Tanja
- New search for: Fabini, Joachim
- New search for: Weippl, Edgar
- New search for: Ullrich, Johanna
- New search for: Zseby, Tanja
- New search for: Fabini, Joachim
- New search for: Weippl, Edgar
In:
IEEE Communications Surveys & Tutorials
;
19
, 2
;
1112-1144
;
2017
- Article (Journal) / Electronic Resource
-
Title:Network-Based Secret Communication in Clouds: A Survey
-
Contributors:Ullrich, Johanna ( author ) / Zseby, Tanja ( author ) / Fabini, Joachim ( author ) / Weippl, Edgar ( author )
-
Published in:IEEE Communications Surveys & Tutorials ; 19, 2 ; 1112-1144
-
Publisher:
- New search for: IEEE
-
Publication date:2017-01-01
-
Size:3522193 byte
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents – Volume 19, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 682
-
Editorial: Second Quarter 2017 IEEE Communications Surveys and TutorialsLin, Ying-Dar et al. | 2017
- 688
-
5G: Adaptable Networks Enabled by Versatile Radio Access TechnologiesSexton, Conor / Kaminski, Nicholas J. / Marquez-Barja, Johann M. / Marchetti, Nicola / DaSilva, Luiz A. et al. | 2017
- 721
-
Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and ChallengesRiazul Islam, S. M. / Avazov, Nurilla / Dobre, Octavia A. / Kyung-sup Kwak, et al. | 2017
- 743
-
Coordinated Multi-Point Clustering Schemes: A SurveyBassoy, Selcuk / Farooq, Hasan / Imran, Muhammad A. / Imran, Ali et al. | 2017
- 765
-
Jammer Localization in Multi-Hop Wireless Network: A Comprehensive SurveyXianglin Wei, / Qiping Wang, / Tongxiang Wang, / Jianhua Fan, et al. | 2017
- 800
-
Void-Handling Techniques for Routing Protocols in Underwater Sensor Networks: Survey and ChallengesGhoreyshi, Seyed Mohammad / Shahrabi, Alireza / Boutaleb, Tuleen et al. | 2017
- 828
-
A Survey of Network Lifetime Maximization Techniques in Wireless Sensor NetworksYetgin, Halil / Cheung, Kent Tsz Kan / El-Hajjar, Mohammed / Hanzo, Lajos et al. | 2017
- 855
-
Low Power Wide Area Networks: An OverviewRaza, Usman / Kulkarni, Parag / Sooriyabandara, Mahesh et al. | 2017
- 874
-
An Ultra Wideband Survey: Global Regulations and Impulse Radio Research Based on StandardsNiemela, Ville / Haapola, Jussi / Hamalainen, Matti / Iinatti, Jari et al. | 2017
- 891
-
A Survey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and ChallengesTao Huang, / Yu, F. Richard / Chen Zhang, / Jiang Liu, / Jiao Zhang, / Yunjie Liu, et al. | 2017
- 918
-
A Survey on the Contributions of Software-Defined Networking to Traffic EngineeringMendiola, Alaitz / Astorga, Jasone / Jacob, Eduardo / Higuero, Marivi et al. | 2017
- 954
-
Resource Management in Cloud Networking Using Economic Analysis and Pricing Models: A SurveyNguyen Cong Luong, / Ping Wang, / Niyato, Dusit / Yonggang Wen, / Zhu Han, et al. | 2017
- 1002
-
A Survey on Replica Server Placement Algorithms for Content Delivery NetworksSahoo, Jagruti / Salahuddin, Mohammad A. / Glitho, Roch / Elbiaze, Halima / Ajib, Wessam et al. | 2017
- 1027
-
A Survey on Multiple-Antenna Techniques for Physical Layer SecurityXiaoming Chen, / Wing Kwan Ng, Derrick / Gerstacker, Wolfgang H. / Hsiao-Hwa Chen, et al. | 2017
- 1054
-
Security and Privacy in Device-to-Device (D2D) Communication: A ReviewHaus, Michael / Waqas, Muhammad / Ding, Aaron Yi / Yong Li, / Tarkoma, Sasu / Ott, Jorg et al. | 2017
- 1080
-
Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic ReviewAlomar, Noura / Alsaleh, Mansour / Alarifi, Abdulrahman et al. | 2017
- 1112
-
Network-Based Secret Communication in Clouds: A SurveyUllrich, Johanna / Zseby, Tanja / Fabini, Joachim / Weippl, Edgar et al. | 2017
- 1145
-
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World SolutionsRudd, Ethan M. / Rozsa, Andras / Gunther, Manuel / Boult, Terrance E. et al. | 2017
- 1173
-
Network Utility Maximization-Based Congestion Control Over Wireless Networks: A Survey and Potential DirectivesQuoc-Viet Pham, / Won-Joo Hwang, et al. | 2017
- 1201
-
Instantly Decodable Network Coding: From Centralized to Device-to-Device CommunicationsDouik, Ahmed / Sorour, Sameh / Al-Naffouri, Tareq Y. / Alouini, Mohamed-Slim et al. | 2017
- 1225
-
Sequence Sets in Wireless Communication Systems: A SurveyVelazquez-Gutierrez, Juan M. / Vargas-Rosales, Cesar et al. | 2017
- 1249
-
Resource Allocation for Underlay Cognitive Radio Networks: A SurveyEl Tanab, Manal / Hamouda, Walaa et al. | 2017
- 1277
-
Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and ApplicationsAli, Abdelmohsen / Hamouda, Walaa et al. | 2017
- 1305
-
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A SurveyShouling Ji, / Mittal, Prateek / Beyah, Raheem et al. | 2017
- 1327
-
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and ApplicationsYassin, Ali / Nasser, Youssef / Awad, Mariette / Al-Dubai, Ahmed / Ran Liu, / Chau Yuen, / Raulefs, Ronald / Aboutanios, Elias et al. | 2017
- 1347
-
A Survey of Selected Indoor Positioning Methods for SmartphonesDavidson, Pavel / Piche, Robert et al. | 2017
- C1
-
Table of contents| 2017