… edge computing that enhances efficiency for resource-constrained IoT devices. Security analysis demonstrates that our proposed scheme effectively …
http://dlvr.it/TMmwZC
Written in
by
… edge computing that enhances efficiency for resource-constrained IoT devices. Security analysis demonstrates that our proposed scheme effectively …
http://dlvr.it/TMmwZC
Tags
Leave a comment