共 33 条
- [1] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
- [2] [Anonymous], 2011, SCYTHER
- [4] Edge of Things: The Big Picture on the integration of Edge, IoT and the Cloud in a Distributed Computing Environment [J]. IEEE ACCESS, 2018, 6 : 1706 - 1717
- [5] MASFOG: An Efficient Mutual Authentication Scheme For Fog Computing Architecture [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 608 - 613
- [6] Fog Computing Applications in Smart Cities: A Systematic Survey [J]. WIRELESS NETWORKS, 2020, 26 (02) : 1433 - 1457
- [7] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
- [8] Ciphertext-policy attribute-based encryption against key-delegation abuse in fog computing [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 720 - 729