Author:
Kaur Jasleen,Agrawal Alka,Khan Raees Ahmad
Reference32 articles.
1. A double obfuscation approach for protecting the privacy of IoT location based applications;Albouq;IEEE Access,2020
2. Fog computing security and privacy issues, open challenges, and blockchain solution: an overview;Alzoubi;Int. J. Elec. Comput. Eng.,2021
3. Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing;Amuthan;J. Ambient Intell. Hum. Comput.,2020
4. August). Fog computing and its role in the internet of things;Bonomi,2012
5. Preserving user location privacy for location-based service;Chen,2016
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献