Privacy-Preserving Techniques in Cloud/Fog and Internet of Things

Cheng-Chi Lee,Mehdi Gheisari,Mohammad Javad Shayegan,Milad Taleby Ahvanooey,Yang Liu
DOI: https://doi.org/10.3390/cryptography7040051
2023-01-01
Cryptography
Abstract:Recently, wireless networks have been developed using cloud infrastructure and software-based networks [...]
What problem does this paper attempt to address?