Open Access
ARTICLE
Jienan Chen, Chuang Zhang, Yu Yan, Yuan Liu*
Software College of Northeastern University, Shenyang, China
* Corresponding Author: Yuan Liu. Email:
(This article belongs to this Special Issue: Blockchain Security)
Computer Modeling in Engineering & Sciences 2022, 130(2), 949-966. https://doi.org/10.32604/cmes.2022.017516
Received 16 May 2021; Accepted 25 August 2021; Issue published 13 December 2021
View
Download
Like
Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...Secure Model of Medical Data Sharing for Complex Scenarios
Wei She, Yue Hu, Zhao Tian, Guoning...A Credit-Based Approach for Overcoming Free-Riding Behaviour in Peer-to-Peer Networks
Manal Hazazi, Afnan Almousa, Heba...