共 50 条
- [1] Securing edge computing using cryptographic schemes: a review [J]. Multimedia Tools and Applications, 2024, 83 : 34825 - 34848
- [2] Securing IOT Devices Using SDN and Edge Computing [J]. PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2016, : 877 - 882
- [4] Vigilia: Securing Smart Home Edge Computing [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 74 - 89
- [6] PixelVault: Using GPUs for Securing Cryptographic Operations [J]. CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1131 - 1142
- [7] Cryptographic Signature Scheme for Mobile Edge Computing Using DLFP Over Semiring [J]. CONTEMPORARY MATHEMATICS, 2024, 5 (02): : 1823 - 1845
- [8] A MODIFIED CRYPTOGRAPHIC APPROACH FOR SECURING DISTRIBUTED DATA STORAGE IN CLOUD COMPUTING [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 131 - 139
- [9] Benchmarking Cryptographic Schemes for Securing Public Cloud Storages (Practical Experience Report) [J]. DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS, DAIS 2017, 2017, 10320 : 163 - 176
- [10] Cryptographic schemes using chaotic system [J]. PROCEEDINGS OF THE 25TH NATIONAL RADIO SCIENCE CONFERENCE: NRSC 2008, 2008, : U505 - U510