[PDF][PDF] Research on node authorization trusted update mechanism based on agent re-encryption in IoT cloud

S Li, Q Sun, H Wu - … Journal of Innovative Computing, Information and …, 2020 - ijicic.org
This paper describes a trusted update mechanism of node authorization based on proxy re-
encrypted in IoT cloud. It defines that the system consists of IoT data server, node …