Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference27 articles.
1. Chen M, Qian Y, Chen J, Hwang K, Mao S, Hu L (2019) Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans Cloud Comput 2(3):1–11
2. Witti M, Konstantas D (2019) Secure and privacy-aware data collection architecture approach in fog node based distributed IoT environment. In: 6th international conference on computer science, engineering and information technology (CSEIT-2019)
3. Akhundov H, Van der Sluis E, Hamdioui S, Taouil M (2019) Public-key based authentication architecture for IoT devices using PUF. In: 6th international conference on computer science, engineering and information technology (CSEIT-2019), 2(1):34–43
4. Imine Y, Lounis A, Bouabdallah A (2019) An efficient accountable privacy-preserving scheme for public information sharing in fog computing. In: 2019 IEEE global communications conference (GLOBECOM), 2(1):34–43
5. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Public Key Cryptogr PKC 2(1):53–70
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献