DEVELOPMENT OF AUTHENTICATION TECHNIQUES ON FOG COMPUTING
Fog computing is a computational approach where the computing capabilities of the cloud are extended to the edge network. The purpose of fog computing is to reduce data transmission latency between end-devices and centralized computing or can also be referred to as cloud. The fog computing approach...
Saved in:
Main Author: | KAMAL NADJIEB (NIM : 13514054), MUHAMMAD |
---|---|
Format: | Final Project |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/29278 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Similar Items
-
FogFly: A traffic light optimization solution based on fog computing
by: MINH, Quang Tran, et al.
Published: (2018) -
FOG COMPUTING UTILIZATION GUIDE IN HOME CONSUMER IOT DEVELOPMENT
by: Aditya Samiadji, Wisnu -
Cloud, edge and fog computing: Trends and case studies
by: OUH, Eng Lieh, et al.
Published: (2021) -
Cloud, edge, and fog computing: Trends and case studies
by: OUH, Eng Lieh, et al.
Published: (2021) -
Expressive bilateral access control for Internet-of-Things in cloud-fog computing
by: XU, Shengmin, et al.
Published: (2021)