Device-to-Device Secure Coded Caching

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Coded Caching Clusters with Device-to-Device Communications

We consider a geographically constrained caching community where popular data files are cached on mobile terminals and distributed through Device-to-Device (D2D) communications. Further, to ensure availability, data files are protected against user mobility, or churn, with erasure coding. Communication and storage costs (in units of energy) are considered. We focus on finding the coding method ...

متن کامل

Optimizing MDS Coded Caching in Wireless Networks with Device-to-Device Communication

We consider the caching of content in the mobile devices in a wireless network using maximum distance separable (MDS) codes. We focus on a small cell, served by a base station (BS), where mobile devices arrive and depart according to a Poisson birth-death process. Users requesting a particular file download coded symbols from caching devices using device-todevice communication. If additional sy...

متن کامل

Cooperative Caching Placement in Cognitive Device-to-Device Networks

—Cognitive radio is regarded as a key technique in the fifth generation communication system. We consider that the popular contents can be cached in cognitive mobile users who compose a cognitive Device-to-Device (D2D) network. Cached

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Evidently secure device associations

A key problem in mobile and ubiquitous computing is that of setting up an association between a pair of devices so that they may communicate securely over a wireless network. It is particularly important to be able to solve this problem for spontaneous associations, which must not depend on preexisting security values such as certificates, and when the only means of identifying the target devic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2020

ISSN: 1556-6013,1556-6021

DOI: 10.1109/tifs.2019.2940885