Open Access
ARTICLE
Ying Du1,2, Shuo Zhang1,2, Pu Cheng3,*, Rita Yi Man Li4, Xiao-Guang Yue5,6
1 School of Computer and Information Engineering, Henan University, Kaifeng, 475004, China
2 Henan Province Engineering Research Center of Spatial Information Processing, Henan University, Kaifeng, 475004, China
3 School of Software, Henan University, Kaifeng, 475004, China
4 Department of Economics and Finance/Sustainable Real Estate Research Center, Hong Kong Shue Yan University, Hong Kong, 999077, China
5 Department of Computer Science and Engineering, European University Cyprus, Nicosia, 1516, Cyprus
6 CIICESI-ESTG, Politécnico do Porto, Felgueiras, 4610-156, Portugal
* Corresponding Author: Pu Cheng. Email:
Computer Modeling in Engineering & Sciences 2023, 135(3), 1965-1979. https://doi.org/10.32604/cmes.2023.024871
Received 10 June 2022; Accepted 20 July 2022; Issue published 23 November 2022
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...