共 25 条
[1]
Almogren A(2019)An automated and intelligent Parkinson disease monitoring system using wearable computing and cloud technology Clust Comput 22 2309-2316
[2]
Cramer R(2004)Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J Comput 33 167-226
[3]
Shoup V(2019)Internet of Things (IoT) mobile cloud cloudlet mobile IoT cloud fog mobile edge and edge emerging computing paradigms: Disambiguation and research directions J Netw Comput Appl 128 105-140
[4]
Elazhary H(2015)Office in cloud: approach to authentication and authorization Recent Adv Commun Netw Technol Bentham Sci 4 49-55
[5]
Gawannavar M(2020)Security considerations for internet of things: a survey SN Comput SCI 1 193-65
[6]
Mandulkar P(2020)Ensuring user authentication and data integrity in multi-cloud environment Hum Cent Comput Inf Sci 10 15-18908
[7]
Thandeeswaran R(2018)A novel framework for internet of knowledge protection in social networking services J Comput Sci 26 55-undefined
[8]
Jeyanthi N(2020)Improving secured ID-based authentication for cloud computing through novel hybrid fuzzy-based homomorphic proxy re-encryption Soft Comput 24 18893-undefined
[9]
Jurcut A(2020)Sengan Sudhakar, Krishnamoorthy Sujatha, Design of peer-to-peer protocol with sensible and secure IoT communication for future internet architecture Microprocess Microsyst 78 103216-undefined
[10]
Niculcea T(undefined)undefined undefined undefined undefined-undefined