A Fog Computing Security: 2-Adic Complexity of Balanced Sequences.
Huijuan WangJiang YongPublished in: Wirel. Commun. Mob. Comput. (2018)
Keyphrases
- single image
- hidden markov models
- intrusion detection
- security issues
- security requirements
- long sequences
- access control
- information security
- variable length
- security policies
- information assurance
- data sets
- security level
- security protocols
- key management
- signature scheme
- computational cost
- np hard
- social networks
- learning algorithm