Login / Signup

Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in Multi-access Edge Computing.

Belal AliMark A. GregoryShuo LiOmar Amjad Dib
Published in: Comput. Networks (2024)
Keyphrases