has been cited by the following article(s):
[1]
|
Security in Internet of Things: A Review
IEEE Access,
2022
DOI:10.1109/ACCESS.2022.3209355
|
|
|
[2]
|
Security in Internet of Things: A Review
IEEE Access,
2022
DOI:10.1109/ACCESS.2022.3209355
|
|
|
[3]
|
Comprehensive report on Homomorphic technique in Healthcare Domain
2021 5th International Conference on Computing Methodologies and Communication (ICCMC),
2021
DOI:10.1109/ICCMC51019.2021.9418039
|
|
|
[4]
|
Frontier Computing
Lecture Notes in Electrical Engineering,
2021
DOI:10.1007/978-981-16-0115-6_58
|
|
|
[5]
|
A Comprehensive Survey of Security Challenges and Threats in Internet of Things
2021 5th International Conference on Information Systems and Computer Networks (ISCON),
2021
DOI:10.1109/ISCON52037.2021.9702368
|
|
|
[6]
|
Secure Computing Resource Allocation Framework For Open Fog Computing
The Computer Journal,
2020
DOI:10.1093/comjnl/bxz108
|
|
|
[7]
|
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
IEEE Access,
2019
DOI:10.1109/ACCESS.2019.2924045
|
|
|
[8]
|
Securing Fog Computing for Internet of Things Applications: Challenges and Solutions
IEEE Communications Surveys & Tutorials,
2018
DOI:10.1109/COMST.2017.2762345
|
|
|