IoT Processing Layer Security

  • Wu C
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

… this aspect, cloud computing plays the dominant role of IoT processing layer, hence the security techniques in cloud computing represent the mainstream of IoT processing layer … Such services include data storage, data encryption, data integrity protection, and data searching …

Cite

CITATION STYLE

APA

Wu, C.-K. (2021). IoT Processing Layer Security (pp. 125–136). https://doi.org/10.1007/978-981-16-1372-2_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free