{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:11:33Z","timestamp":1753884693997,"version":"3.41.2"},"reference-count":2,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,9,9]],"date-time":"2018-09-09T00:00:00Z","timestamp":1536451200000},"content-version":"vor","delay-in-days":251,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>In the fog computing environment, the periodic sequence can provide sufficient authentication code and also reduce the power consumption in the verification. But the periodic sequence faces a known full\u2010cycle attack threat in fog computing. This paper studies the 2\u2010adic complexity attack ability of the periodic balance sequence in the fog computing environment. It uses the exponential function as a new approach to study the 2\u2010adic properties of periodic balance sequence and presents that the 2\u2010adic complexity of the periodic balanced sequence is not an attacking threat when used in fog computing.<\/jats:p>","DOI":"10.1155\/2018\/7209475","type":"journal-article","created":{"date-parts":[[2018,9,9]],"date-time":"2018-09-09T23:31:32Z","timestamp":1536535892000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Fog Computing Security: 2\u2010Adic Complexity of Balanced Sequences"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3862-0323","authenticated-orcid":false,"given":"Wang","family":"Hui-Juan","sequence":"first","affiliation":[]},{"given":"Jiang","family":"Yong","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,9,9]]},"reference":[{"key":"e_1_2_6_1_2","first-page":"15","article-title":"A study of encryption algorithms, de sand for security","volume":"13","author":"Mahajan P.","year":"2013","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_2_6_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/18.605605"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7209475.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/7209475.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/7209475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T06:03:11Z","timestamp":1723010591000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/7209475"}},"subtitle":[],"editor":[{"given":"Fuhong","family":"Lin","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":2,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/7209475"],"URL":"https:\/\/doi.org\/10.1155\/2018\/7209475","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-01-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-03-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"7209475"}}