Author:
Wang Chunbo,Liu Xu,Li Hang,Di Xiaoqiang,Cong Ligang,Zhang Siyu,Qi Hui
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference37 articles.
1. A novel protocol for efficient authentication in cloud-based IoT devices;Alam;Multimed Tools Appl.,2022
2. Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services;Zaraket;Cluster Computing.,2023
3. J. Hassan, D. Shehzad, U. Habib, M.U. Aftab, M. Ahmad, R. Kuleev, M. Mazzara. The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR), Computational Intelligence and Neuroscience. 2022. (2022). e8303504. https://doi.org/10.1155/2022/8303504.
4. Edge-based auditing method for data security in resource-constrained Internet of Things;Wang;Journal of Systems Architecture.,2021
5. Blockchain-Enabled Multiparty Computation for Privacy Preserving and Public Audit in Industrial IoT;Yang;IEEE Transactions on Industrial Informatics.,2022
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献