Analytical Review of Cryptographic Primitives to Use in Fog Computing
This paper discusses the security aspects of fog computing. Most cryptographic algorithms were designed for centralized systems, but distributed systems such as cloud and fog computing present additional challenges due to the geographic separation of computing nodes. The paper presents a study of ad...
Сохранить в:
| Главные авторы: | Shiriaev, E. M., Ширяев, Е. М., Kucherov, N. N., Кучеров, Н. Н., Bezuglova, E. S., Безуглова, Е. С. |
|---|---|
| Формат: | Статья |
| Язык: | English |
| Опубликовано: |
Springer Science and Business Media Deutschland GmbH
2024
|
| Темы: | |
| Online-ссылка: | https://dspace.ncfu.ru/handle/123456789/29307 |
| Метки: |
Добавить метку
Нет меток, Требуется 1-ая метка записи!
|
Схожие документы
-
Modification and Adaptation of Methods and Algorithms of the Active Security Concept for Fog Systems
Автор: Shiriaev, E. M., и др.
Опубликовано: (2024) -
An Approach to Reducing Device Uncertainty in Fog-Cloud Computing
Автор: Kucherov, N. N., и др.
Опубликовано: (2024) -
Toward Understanding Uncertainty in Fog-Cloud Computing for Big Data Storage and Processing
Автор: Kucherov, N. N., и др.
Опубликовано: (2024) -
Analytical Review of Classification and Clustering Methods of Cyber Attacks Based on Data Mining and Neural Network Approach
Автор: Fedina, A. D., и др.
Опубликовано: (2024) -
A survey on multi-cloud storage security: threats and countermeasures
Автор: Bezuglova, E. S., и др.
Опубликовано: (2023)