A secure and flexible edge computing scheme for AI-driven industrial IoT.
Yan ZhaoNing HuYue ZhaoZhihan ZhuPublished in: Clust. Comput. (2023)
Keyphrases
- artificial intelligence
- key management
- public key encryption
- edge detection
- key exchange
- authentication scheme
- secret sharing
- key management scheme
- secret sharing scheme
- expert systems
- digital signature scheme
- industrial applications
- lightweight
- electronic voting
- case based reasoning
- protection scheme
- key distribution
- rfid systems
- key agreement
- data driven
- edge information
- intelligent systems
- ai systems
- private key
- highly efficient
- blind signature
- security model
- proxy re encryption
- authentication protocol
- encryption key
- security analysis
- management system
- knowledge representation