1 |
Jung, Tae-Won, Jong-Yong Lee, and Kye-Dong Jung, "Traffic-based reinforcement learning with neural network algorithm in fog computing environment," International Journal of Internet, Broadcasting and Communication, Vol. 12, No. 1, pp.144-150, 2020.
DOI
|
2 |
Moon, Seung Hyeog, "Big Data Platform Construction and Application for Smart City Development," The Journal of the Convergence on Culture Technology, Vol. 6, No. 2, pp.529-534, 2020.
DOI
|
3 |
Jang, Eun-Jin, and Seung-Jung Shin, "Proposal of new data processing function to improve the security of self-driving cars' systems," The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 20, No. 4, pp.81-86, 2020.
DOI
|
4 |
Bethencourt, John, Amit Sahai, and Brent Waters, "Ciphertext-policy attribute-based encryption," in 2007 IEEE symposium on security and privacy (SP'07), IEEE, pp.321-334, 2007.
|
5 |
Park, Chulsu, and Jaesang Cha, "Analysis of Component Technology for Smart City Platform," International Journal of Advanced Culture Technology, Vol. 7, No.3, pp.143-148, 2019.
DOI
|
6 |
Ibraimi, L., Petkovic, M., Nikova, S., Hartel, P., & Jonker, W., "Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes," IEEE Trans. Image process, 2009.
|
7 |
Song, You-Jin, "Data Access Privilege Management with a Revocation Period in a Cloud Environment," International Journal of Software Engineering and Its Applications, Vol. 10, No. 7, pp.127-134, 2016.
DOI
|
8 |
Blaze, Matt, Gerrit Bleumer, and Martin Strauss, "Divertible protocols and atomic proxy cryptography," in International Conference on the Theory and Applications of Cryptographic Techniques, Springer, Berlin, Heidelberg, pp.127-144, 1998.
|