Author:
Sarma Richa,Barbhuiya Ferdous Ahmed
Subject
Electrical and Electronic Engineering,General Computer Science,Control and Systems Engineering
Reference25 articles.
1. Management of resource constrained devices in the internet of things;Sehgal;IEEE Commun Mag,2012
2. Bonomi F, Milito R, Zhu J, Addepalli S. Fog Computing and Its Role in the Internet of Things. In: MCC workshop on mobile cloud computing. ISBN: 978-1-4503-1519-7, 2012, p. 13–6.
3. Bethencourt J, Sahai A, Waters B. Ciphertext-Policy Attribute-Based Encryption. In: IEEE symposium on security and privacy. 2007, p. 321–34.
4. Attribute-based encryption optimized for cloud computing;Horváth,2015
5. Sahai A, Waters B. Fuzzy Identity-Based Encryption. In: Cramer R, editor. Advances in cryptology – EUROCRYPT 2005. ISBN: 978-3-540-32055-5, 2005, p. 457–73.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献