Cited By
View all- and Communication Networks S(2023)RetractedSecurity and Communication Networks10.1155/2023/98475042023Online publication date: 1-Jan-2023
By using fog computing, cloud computing can be extended to the edge of the network. Generally, in the public cloud, fog computing comprises three components: terminal device, fog node and public cloud server (PCS). In this paper, we propose the concept ...
Internet of Things (IoT) is an upcoming platform where information and communication technology connect multiple embedded devices to the Internet for performing information exchange. Owing to the immense development of this technology, embedded devices ...
According to the National Institute of Standard and Technology (NIST), the security level of RSA is safe when it is N-bit modulus ≥ 2048 bits. Because of this, the processing time to generate asymmetric keys also increases. Taking this ...
John Wiley & Sons, Inc.
United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in