Login / Signup
Securing edge computing using cryptographic schemes: a review.
Ganesh Kumar Mahato
Swarnendu Kumar Chakraborty
Published in:
Multim. Tools Appl. (2024)
Keyphrases
</>
edge information
edge detection
case study
smart card
information systems
similarity measure
cellular automata
literature review
multiple scales
key management