Cargando…

Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation

In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a...

Descripción completa

Detalles Bibliográficos
Autores principales: Lin, Han-Yu, Tsai, Tung-Tso, Ting, Pei-Yih, Fan, Yan-Rong
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007563/
https://www.ncbi.nlm.nih.gov/pubmed/36904909
http://dx.doi.org/10.3390/s23052706