Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Protect Applications and Data in Use in IoT Environment Using Collaborative Computing
In IoT systems, traditional encryption can be used to protect IoT applications and data at rest or in transit that transforms data in to ciphertext making it unreadable. However, it is very challenging to prot...
-
Article
Data anonymization evaluation against re-identification attacks in edge storage
Edge storage is driven by the emerging edge computing and application intelligence, which makes the data anonymization become essential to guarantee the security of the data. The risk with data anonymization i...