Publisher
Springer Science and Business Media LLC
Reference30 articles.
1. Rao, K., Kalaiarasi, K.: A proposal for congestion control in multi-hop mobile ad hoc networks using cross-layer based TCP protocol approach. Int. J. Comput. Sci. Issues 12(5), 136 (2015)
2. Ni, J., Zhang, K., Lin, X., Shen, X.S.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601–628 (2018)
3. Yousefpour, A., Ishigaki, G., Gour, R., Jue, J.P.: On reducing IoT service delay via fog offloading. IEEE Internet Things J. 5(2), 998–1010 (2018)
4. Milberg, S.J., Burke, S.J., Smith, H.J., Kallman, E.A.: Values, personal information privacy, and regulatory approaches. Commun. ACM 38(12), 65–74 (1995)
5. Chaum, D., Evertse, J-H.: A secure and privacy-protecting protocol for transmitting personal information between organizations. In: Advances in Cryptology—CRYPTO’ 86, pp. 118–167 (1987)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献