Author:
Surendran Priyanka,Thomas Bindhya,John Densy,Prasanth Anupama,Winston Joy,Jilani AbdulKhadar
Publisher
Springer Nature Singapore
Reference15 articles.
1. Rana, S., Mishra, D., Arora, R.: Privacy-preserving key agreement protocol for fog computing supported internet of things environment. Wirel. Pers. Commun. 119(1), 727–747 (2021)
2. Verma, U., Bhardwaj, D.: Design of lightweight authentication protocol for fog enabled internet of things—a centralized authentication framework. Int. J. Commun. Netw. Inform. Sec. 12(2), 162–167 (2020)
3. Maharaja, R., Iyer, P., Ye, Z.: A hybrid fog-cloud approach for securing the Internet of Things. Clust. Comput. 23(2), 451–459 (2020)
4. Andrade, L., Lira, C., Mello, B.D., Andrade, A., Coutinho, A., Prazeres, C.: Fog of things: fog computing in internet of things environments. In: Special Topics in Multimedia, IoT and Web Technologies, pp. 23–50. Springer, Cham (2020)
5. Yang, R., Xu, Q., Au, M.H., Yu, Z., Wang, H., Zhou, L.: Position based cryptography with location privacy: a step for fog computing. Futur. Gener. Comput. Syst. 78, 799–806 (2018)