Endogenous Security of Computation Offloading in Blockchain-Empowered Internet of Things.
Yiliang LiuZhou SuBobo YuPublished in: CoRR (2022)
Keyphrases
- information security
- security requirements
- security issues
- security management
- intrusion detection
- mobile devices
- access control
- key technologies
- network security
- network management
- database
- physical world
- sensitive data
- computer security
- security protocols
- data security
- security systems
- malware detection
- social networks