Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Cost optimization of cloud-edge-fog federated systems with bidirectional offloading: one-hop versus two-hop
Edge and fog computing technologies are akin to cloud computing but operate in closer proximity to users, offering similar services on a more widely distributed and localized scale. To enhance the computing en...
-
Chapter and Conference Paper
Authentication of Real-Time Communication System Using KIS Scheme
In global communication environment, signature computation will be frequently performed on a relatively insecure device that cannot be trusted all times to maintain the secrecy of the private key. To deal with...