TMO: time domain outsourcing attribute-based encryption scheme for data acquisition in edge computing

Y Li, Z Dong, K Sha, C Jiang, J Wan, Y Wang - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of the Internet of Things and the ever-increasing demands of
advanced services and applications, edge computing is proposed to move the computing …

[PDF][PDF] TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing

Y LI, Z DONG, K SHA, C JIANG, J WAN, Y WANG - scholar.archive.org
With the rapid development of the Internet of Things and the ever-increasing demands of
advanced services and applications, edge computing is proposed to move the computing …

[PDF][PDF] TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing

Y LI, Z DONG, K SHA, C JIANG, J WAN, Y WANG - researchgate.net
With the rapid development of the Internet of Things and the ever-increasing demands of
advanced services and applications, edge computing is proposed to move the computing …

[引用][C] TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in Edge Computing

Y Li, Z Dong, K Sha, C Jiang, J Wan, Y Wang - IEEE Access, 2019 - ui.adsabs.harvard.edu
TMO: Time Domain Outsourcing Attribute-Based Encryption Scheme for Data Acquisition in
Edge Computing - NASA/ADS Now on home page ads icon ads Enable full ADS view NASA/ADS …

[PDF][PDF] TMO: Time Domain Outsourcing Attribute-based Encryption Scheme for Data Acquisition in Edge Computing

Y Li, Z Dong, K Sha, C Jiang, J Wan, Y Wang - academia.edu
With the rapid development of Internet of Things and the ever-increasing demands of
advanced services and applications, edge computing is proposed to move the computing …