Open Access
ARTICLE
Xiangyu Wu1, Xuehui Du1,*, Qiantao Yang1,2, Aodi Liu1, Na Wang1, Wenjuan Wang1
1 He’nan Province Key Laboratory of Information Security, Information Engineering University, Zhengzhou, 450000, China
2 School of Cyber Science Engineering, Zhengzhou University, Zhengzhou, 450000, China
* Corresponding Author: Xuehui Du. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.052708
Received 11 April 2024; Accepted 06 June 2024; Published online 10 July 2024
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Research on Trust Model in Container-Based Cloud Service
Xiaolan Xie, Tianwei Yuan, Xiao...Reliable Medical Recommendation Based on Privacy-Preserving Collaborative Filtering
Mengwei Hou, Rong Wei, Tiangang...Securing Display Path for Security-Sensitive Applications on Mobile Devices
Jinhua Cui, Yuanyuan Zhang, Zhiping...