您当前的位置:
首页 >
文章列表页 >
Joint resource configuration method for secure fog computing Internet of things
Papers | 更新时间:2024-05-31
    • Joint resource configuration method for secure fog computing Internet of things

    • Journal on Communications   Vol. 44, Issue 7, Pages: 26-37(2023)
    • DOI:10.11959/j.issn.1000-436x.2023134    

      CLC: TN929.52
    • Online First:2023-07

      Published:25 July 2023

    移动端阅览

  • Shibo ZHANG, Hongyuan GAO, Yumeng SU, et al. Joint resource configuration method for secure fog computing Internet of things[J]. Journal on Communications, 2023, 44(7): 26-37. DOI: 10.11959/j.issn.1000-436x.2023134.

  •  
  •  

0

Views

1761

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Verifiable secure image retrieval for cloud-assisted IoT environments
Research on distributed network intrusion detection system for IoT based on honeyfarm
Semantic representation and interval roughness analysis of IoT CapBAC rules
Survey of IoT security research: threats, detection and defense
Verifiable access control scheme based on unpaired CP-ABE in fog computing

Related Author

DUAN Zhenhua
TIAN Cong
WANG Wensheng
MA Zhi
GUO Jiaqi
Jiajia HAO
Hao WU
Yunlong LU

Related Institution

School of Computer Science and Technology, Xidian University
School of Electronic and Information Engineering, Beijing Jiaotong University
State Key Laboratory of Advanced Rail Autonomous Operation
Key Lab on High Trusted Information System of Hebei Province
School of Cyber Security and Computer, Hebei University
0