Cargando…
Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access †
Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better ac...
Autores principales: | Han, Daoqi, Du, Xiaofeng, Lu, Yueming |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7218864/ https://www.ncbi.nlm.nih.gov/pubmed/32326501 http://dx.doi.org/10.3390/s20082231 |
Ejemplares similares
-
Secure and trustworthy cyberphysical microfluidic biochips: a practical guide to cutting-edge design techniques for implementing secure and trustworthy cyberphysical microfluidic biochips
por: Tang, Jack, et al.
Publicado: (2019) -
Secure and trustworthy transportation cyber-physical systems
por: Sun, Yunchuan, et al.
Publicado: (2017) -
Security, Privacy, and Trustworthiness of Sensor Networks and Internet of Things
por: Katsikas, Sokratis, et al.
Publicado: (2020) -
A Secure and Efficient ECC-Based Scheme for Edge Computing and Internet of Things
por: AlMajed, Hisham, et al.
Publicado: (2020) -
Joint Optimization for Mobile Edge Computing-Enabled Blockchain Systems: A Deep Reinforcement Learning Approach
por: Hu, Zhuoer, et al.
Publicado: (2022)