Keywords: Fog computing, Social IoT, Industrial Internet of Things (IIoT), social profile, mutual- authentication, key agreement
This document is hosted externally.
Unless the owner has removed it from the web, you can access the full document via its original URL:
https://assets.researchsquare.com/files/rs-1669550/v1_covered.pdf?c=1653659780Unless the owner has removed it from the web, you can access the full document via its original URL:
See similar contracts (1)
Alternatively, you can try searching for similar contracts: