Cargando…
Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users’ requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a...
Autores principales: | Lin, Han-Yu, Tsai, Tung-Tso, Ting, Pei-Yih, Fan, Yan-Rong |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007563/ https://www.ncbi.nlm.nih.gov/pubmed/36904909 http://dx.doi.org/10.3390/s23052706 |
Ejemplares similares
-
Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
por: Tang, Yongli, et al.
Publicado: (2023) -
An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments
por: Lin, Han-Yu, et al.
Publicado: (2022) -
Anonymous-authentication scheme based on fog computing for VANET
por: Han, Mu, et al.
Publicado: (2020) -
An Improved Proxy Re-Encryption Scheme for IoT-Based Data Outsourcing Services in Clouds
por: Lin, Han-Yu, et al.
Publicado: (2020) -
Attribute-Based Proxy Re-Encryption with Keyword Search
por: Shi, Yanfeng, et al.
Publicado: (2014)