Security Storage Based on Fountain Code and XOR Encryption in Edge Computing
暂无分享,去创建一个
[1] Weisong Shi,et al. Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.
[2] Ming Xiao,et al. A study of distributed storage systems with network coding in wireless networks , 2014, 2014 IEEE International Conference on Communication Systems.
[3] Xuefeng Liu,et al. Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing , 2019, IEEE Transactions on Services Computing.
[4] Yun Liu,et al. Performance Optimization of Network Coding Based Communication and Reliable Storage in Internet of Things , 2017, ArXiv.
[5] Ali A. Ghorbani,et al. A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT , 2017, IEEE Access.
[6] B. Srikanth,et al. A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing , 2019 .
[7] Mukesh Singhal,et al. A Light-Weight Permutation Based Method for Data Privacy in Mobile Cloud Computing , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.