• No results found

Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications

N/A
N/A
Protected

Academic year: 2020

Share "Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Fig. 1: Typical architecture of MEC assisted IoT applications
Fig. 2: Communication model of our scheme
Fig. 3: The proposed scheme
TABLE II: Time cost of referring cryptographics
+2

References

Related documents

Keywords: algebraic cryptanalysis, SAT solver, ElimLin, symmetric encryp- tion, GOST, Simon, Bitcoin brain wallets, Elliptic curves...

The authors in [5,16] use a filtering approach to obtain an estimate for the volatilities in the case of the Heston model and the Double Heston model respectively. In this study,

Some of you may already know about graphic novels and even have a collection for your younger patrons (and may have previously read this volume’s companion work, The Librarian’s

As the language learning progresses, students will directly interact with native speakers, especially in the Oltrarno neighborhood where the Study Center is located, or with

Glow Golf Sponsors 2 Anniversaries, Birth- days 2 Membership 2 2011 Council 2 Community Action 3 Legislation 4.. Ways & Means 4 Cosmic Bowling 5 Wine & Nine

a)“Agency” means The Maryland Insurance Administration, as identified in the CATS+ TORFP # MIA­ 15-010. b) “CATS+ TORFP” means the Task Order Request for Proposals #

As a result, while ethanol production has had a significant and positive impact on corn price, it does not fully explain price level changes in the 2006/2007 marketing year.. What