Research Article

A Trusted and Privacy-Preserved Dispersed Computing Scheme for the Internet of Mobile Things

Algorithm 1

User security domain division.
Input:
Output:
(1) ,
(2)For in
(3)  if  = =  and
(4)    Equation1holds Then
(5)      Appendto
(6)  end
(7)  else if  = =  and
(8)1holds Then
(9)      Appendto
(10)  end
(11)else
(12)Append to
(13)end
(14)end
(15)  = 
(16)return