Author:
Diro Abebe Abeshu,Chilamkurti Naveen
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference31 articles.
1. Securing the Internet of Things: A Proposed Framework, 2016, http://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html .
2. Octopus: An edge-fog mutual authentication scheme;Ibrahim;J. Netw. Secur.,2016
3. I. Stojemovic, S. Wen, The fog computing paradigm: Scenarios and security issues, in: IEEE Federated Conference on Computer Science and Information Systems, 2014.
4. Fog computing for the internet of things: Security and privacy issues;Alrawais;IEEE Internet Comput.,2017
5. S. Yi, Z. Qin, Q. Li, Security and privacy issues of fog computing: A survey, in: International Conference on Wireless Algorithms, Systems and Applications, WASA, 2015.
Cited by
631 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献