Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference46 articles.
1. Aazam M, Harras KA, Zeadally S (2019) Fog computing for 5G tactile industrial internet of things: Qoe-aware resource allocation model. IEEE Trans Ind Inform 15(5):3085–3092
2. Al Hamid HA, Rahman SMM, Hossain MS, Almogren A, Alamri A (2017) A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5:22313–22328
3. Almehmadi T, Alshehri S, Tahir S (2019) A secure fog-cloud based architecture for MIoT. In: 2019 2nd International Conference on Computer Applications and Information Security (ICCAIS). IEEE, pp 1–6
4. Amin R, Kumar N, Biswas G, Iqbal R, Chang V (2018) A light weight authentication protocol for iot-enabled devices in distributed cloud computing environment. Future Gener Comput Syst 78:1005–1019
5. Arkko J, Lehtovirta V, Eronen P (2009) Improved extensible authentication protocol method for 3rd generation authentication and key agreement (EAP-AKA’). Netw Work Group Req Comments 5448:1–29
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献