Research Article

The New Method of Sensor Data Privacy Protection for IoT

Figure 4

Proxy re-encryption.