Data encryption in fog computing using hybrid cryptography with integrity check
Over the years, research carried on data encryption in fog computing emphasized
confidentiality, authentication, and access control. However, some limitations were …
confidentiality, authentication, and access control. However, some limitations were …