Related references
Note: Only part of the references are listed.Fog Computing Security Challenges and Future Directions
Deepak Puthal et al.
IEEE CONSUMER ELECTRONICS MAGAZINE (2019)
Fog Computing Based Face Identification and Resolution Scheme in Internet of Things
Pengfei Hu et al.
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2017)
MOBILE-EDGE COMPUTING FOR VEHICULAR NETWORKS A Promising Network Paradigm with Predictive Off-Loading
Ke Zhang et al.
IEEE VEHICULAR TECHNOLOGY MAGAZINE (2017)
An Attribute-Based Encryption Scheme to Secure Fog Communications
Arwa Alrawais et al.
IEEE ACCESS (2017)
A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications
Shuo Wang et al.
IEEE ACCESS (2017)
From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework
Opeyemi Osanaiye et al.
IEEE ACCESS (2017)
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things
Pengfei Hu et al.
IEEE INTERNET OF THINGS JOURNAL (2017)
Fog computing security: a review of current applications and security solutions
Saad Khan et al.
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS (2017)
Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption
Ruilong Deng et al.
IEEE INTERNET OF THINGS JOURNAL (2016)
Fog Cloud Caching at Network Edge via Local Hardware Awareness Spaces
Marat Zhanikeev
2016 IEEE 36TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2016) (2016)
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks
Mohsen Rezvani et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)
Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
Haifeng Yu
DISTRIBUTED COMPUTING (2011)
Secure encrypted-data aggregation for wireless sensor networks
Shih-I Huang et al.
WIRELESS NETWORKS (2010)