All Stories

  1. An Approach for Data integrity authentication and protection in fog computing