Identity authentication for edge devices based on zero-trust architecture[J] CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE Liu, Haiqing Ai, Ming Huang, Rong Qiu, Rixuan Li, Yuancheng
Applying an auction optimization algorithm to mobile edge computing for security[J] IET COMMUNICATIONS Wang, Yi Tang, Tao Jiang, Fang Xu, Yaohua Li, Liping Huang, Rong