1. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments.;Sohal;Comput. Secur.,2017
2. Secure schemes for secret sharing and key distribution. technion-israel institute of technology;Beimel;Faculty of computer science,1996
3. Message-locked Encryption and Secure Deduplication”;Bellare,2013
4. Interactive Message-locked Encryption and Secure Deduplication;Bellare,2015
5. L. Boneh, The stanford pairing based crypto library, 2014, [Online]. Available: http://crypto.stanford.edu/pbc, accessed May 7.