Author:
Meng Fei,Cheng Leixiao,Wang Mingqiang
Publisher
Springer Science and Business Media LLC
Subject
General Computer Science,Theoretical Computer Science
Reference33 articles.
1. Bonomi F, Milito R A, Zhu J, Addepalli S. Fog computing and its role in the internet of things. In: Proceedings of the 1st Edition of the MCC Workshop on Mobile Cloud Computing. 2012, 13–16
2. Ivan S, Wen S. The fog computing paradigm: scenarios and security issues. In: Proceedings of Federated Conference on Computer Science and Information Systems. 2014, 1–8
3. Yi S, Li C, Li Q. A survey of fog computing: concepts, applications and issues. In: Proceedings of Workshop on Mobile Big Data. 2015, 37–42
4. Stojmenovic I, Wen S, Huang X, Luan H. An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 2016, 28(10): 2991–3005
5. Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, eds. Advances in Cryptology — EUROCRYPT 2005, Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg, 2005, 457–473
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献