Security and Privacy Issues of Fog Computing
Vol. 42, No. 1, pp. 257-267, Jan. 2017
PDF Full-Text
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
H. Nam, H. Choi, H. Shin, H. Kwon, J. Jeong, C. Hahn, J. Hur, "Security and Privacy Issues of Fog Computing," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 257-267, 2017. DOI: .
[ACM Style]
Hyun-Jae Nam, Ho-Yeol Choi, Hyung-June Shin, Hyun-Soo Kwon, Jong-Min Jeong, Chang-Hee Hahn, and Jun-Beom Hur. 2017. Security and Privacy Issues of Fog Computing. The Journal of Korean Institute of Communications and Information Sciences, 42, 1, (2017), 257-267. DOI: .
[KICS Style]
Hyun-Jae Nam, Ho-Yeol Choi, Hyung-June Shin, Hyun-Soo Kwon, Jong-Min Jeong, Chang-Hee Hahn, Jun-Beom Hur, "Security and Privacy Issues of Fog Computing," The Journal of Korean Institute of Communications and Information Sciences, vol. 42, no. 1, pp. 257-267, 1. 2017.