Cargando…
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007563/ https://www.ncbi.nlm.nih.gov/pubmed/36904909 http://dx.doi.org/10.3390/s23052706 |