Research Article
A Trusted and Privacy-Preserved Dispersed Computing Scheme for the Internet of Mobile Things
Algorithm 1
User security domain division.
| Input: | | Output: | (1) | , | (2) | For in | (3) | if = = and | (4) | Equation1holds Then | (5) | Appendto | (6) | end | (7) | else if = = and | (8) | 1holds Then | (9) | Appendto | (10) | end | (11) | else | (12) | Append to | (13) | end | (14) | end | (15) | = | (16) | return |
|