Open Access
ARTICLE
Feng Zhao1, Hongtao Ding2, Chunhai Li1,*, Zhaoyu Su2, Guoling Liang2, Changsong Yang3
1 Guangxi Engineering Research Center of Industrial Internet Security and Blockchain, Guilin University of Electronic Technology, Guilin, 541004, China
2 School of Information and Communication, Guilin University of Electronic Technology, Guilin, 541004, China
3 School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China
* Corresponding Author: Chunhai Li. Email:
(This article belongs to the Special Issue: Security and Privacy for Blockchain-empowered Internet of Things)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.052233
Received 27 March 2024; Accepted 14 May 2024; Published online 11 June 2024
View
Download
Like
Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services
Dae-Young Kim, Se Dong Min, Seokhoon...A Capacity Improving Scheme in Multi-RSUs Deployed V2I
Yueyun Chen, Zhuo Zeng, Taohua...