Author:
Ma Li,Duan Binbin,Zhang Bo,Li Yang,Fu Yingxun,Ma Dongchao
Funder
The National Natural Science Foundation of China
The Natural Science Foundation of Beijing
Publisher
Springer Science and Business Media LLC
Reference24 articles.
1. Khan WZ, Ahmed E, Hakak S et al (2019) Edge computing: a survey [J]. Future Generation Comput Syst 97:219–235
2. Ansari MS, Alsamhi SH, Qiao Y et al (2020) Security of distributed intelligence in edge computing: Threats and countermeasures [J]. The Cloud-to-Thing Continuum: Opportunities and Challenges in Cloud, Fog and Edge Computing, : 95–122
3. Conti M, Dragoni N, Lesyk V (2016) A survey of man in the middle attacks [J]. IEEE Commun Surv Tutorials 18(3):2027–2051
4. Pedersen TP (1991) Non-interactive and information-theoretic secure verifiable secret sharing [C]//Annual international cryptology conference. Berlin, Heidelberg: Springer Berlin Heidelberg, : 129–140
5. Huigui R, Jinxia M, Bingguo C, Guang S, Fei L Key distribution and recovery algorithm based on Shamir Secret sharing [J]. J Commun 2015, 36(03):64–73