A survey on various security protocols of edge computing
Crossref DOI link: https://doi.org/10.1007/s11227-024-06678-6
Published Online: 2024-12-18
Published Print: 2025-01
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Bhattacharya, Tathagata
Peddi, Adithya Vardhan
Ponaganti, Srikanth
Veeramalla, Sai Teja
Text and Data Mining valid from 2024-12-18
Version of Record valid from 2024-12-18
Article History
Accepted: 31 October 2024
First Online: 18 December 2024
Declarations
:
: Not Applicable