Author:
Sharma Shivam,Singla Kanav,Rathee Geetanjali,Saini Hemraj
Reference20 articles.
1. Ali, M., Dhamotharan, R., Khan, E., Khan, S.U., Vasilakos Athanasios V., Li, K., Zomaya Albert, Y.: SeDaSC: secure data sharing in clouds. IEEE Syst. J. 11(2), 395–404 (2017)
2. Xiao, Z., Yang, X.: Security and privacy in cloud computing. IEEE Commun. Surv. Tutor. 15(2), 843–859 (2013)
3. Meng, S., Wang, Y., Jiao, L., Miao, Z., Sun, K.: Hierarchical evolutionary game based dynamic cloudlet selection and bandwidth allocation for mobile cloud computing environment. IET Commun. 13(1), 16–25 (2018)
4. Esposito, C., Castiglione, A., Pop, F., Choo, K.-K. R.: Challenges of connecting edge and cloud computing: a security and forensic perspective. IEEE Cloud Comput. 4(2), 13–17 (2017)
5. Park, J.-E., Park, Y.-H.: Fog-based file sharing for secure and efficient file management in personal area network with heterogeneous wearable devices. J. Commun. Netw. 20(3), 279–290 (2018)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献