Search alternatives:
fog computing » edge computing (Expand Search), _ computing (Expand Search)
Showing 1 - 7 results of 7 for search 'fog computing security', query time: 0.04s Refine Results
  1. 1

    A Secure and Scalable Sidechain Model for Fog Computing in Healthcare Systems by Amhaz, Ali

    Published 2022
    “…This work will suggest a scalable and secure model for fog and cloud computing in healthcare systems that depend on sidechains and the clustering of the available fog nodes. …”
    Get full text
    Get full text
    Get full text
    masterThesis
  2. 2

    A lightweight blockchain and fog-enabled secure remote patient monitoring system by Cheikhrouhou, Omar

    Published 2023
    “…Moreover, the augmentation of Fog computing improved the responsiveness of the remote patient monitoring system by 40%.…”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  3. 3

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque, Ahmed

    Published 2023
    “…IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. For instance, fog computing reduces parking, platform, fuel, and CO2 emissions. …”
    Get full text
    Get full text
    Get full text
    article
  4. 4

    Industrial Internet of Things enabled technologies, challenges, and future directions by Shams Forruque Ahmed (16517712)

    Published 2023
    “…IIoT applications use the intelligence of things to solve industrial problems like supply chain mismanagement, data privacy risks, a weak cloud strategy, cost containment, and others. For instance, fog computing reduces parking, platform, fuel, and CO<sub>2</sub> emissions. …”
  5. 5

    Leveraging a novel NFT-enabled blockchain architecture for the authentication of IoT assets in smart cities by Usman Khalil (7820876)

    Published 2023
    “…It enables NFTs to employ fog computing for all users and smart devices connected to a fog node in a cyber-physical system. …”
  6. 6

    Fire detection and anti-fire system to enhance food security: A concept of smart agriculture systems-based IoT and embedded systems with machine-to-machine protocol by Morchid, Abdennabi

    Published 2025
    “…The proposed system has four technology levels: 1) the edge network layer, 2) the fog network layer, 3) the cloud computing layer, and 4) the data representation layer. …”
    Get full text
    Get full text
    Get full text
    article
  7. 7

    NFTs for the Unassailable Authentication of IoT Devices in Cyber-Physical Systems: An Implementation Study by Usman Khalil (7820876)

    Published 2025
    “…The code is structured with functions for Wi-Fi setup, TCP API requests, and secure communication challenges. Integration involves compiling and flashing the code onto ESP32 devices, verifying EOA generation, and mapping devices, fog nodes, and users through smart contract interactions. …”