Author:
Vangala Anusha,Das Ashok Kumar
Publisher
Springer International Publishing
Reference85 articles.
1. Abdalah, A. N., Mohamed, A., & Hefny, H.A. (2020). Proposed authentication protocol for IoT using blockchain and fog nodes. International Journal of Advanced Computer Science and Applications, 11(4)
2. Advanced Encryption Standard (AES). (2001). FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Accessed on February 2021.
3. Albawi, S., Mohammed, T. A., & Al-Zawi, S. (2017). Understanding of a convolutional neural network. In International Conference on Engineering and Technology (ICET) (pp. 1–6). https://doi.org/10.1109/ICEngTechnol.2017.8308186.
4. Ali, A., Ahmed, M., Imran, M., & Khattak, H.A. (2020). Security and privacy issues in fog computing (chap. 5, pp. 105–137). Hoboken: John Wiley & Sons, Ltd. https://doi.org/10.1002/9781119551713.ch5.
5. Almadhoun, R., Kadadha, M., Alhemeiri, M., Alshehhi, M., & Salah, K. (2018). A user authentication scheme of IoT devices using blockchain-enabled fog nodes. In 15th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA), Aqaba, Jordan (pp. 1–8).