Open Access
ARTICLE
Roseline Oluwaseun Ogundokun1,2, Joseph Bamidele Awotunde3, Hakeem Babalola Akande4, Cheng-Chi Lee5,6,*, Agbotiname Lucky Imoize7,8
1 Department of Multimedia Engineering, Kaunas University of Technology, Kaunas, 44249, Lithuania
2 Department of Computer Science, Landmark University, Omu Aran, 251103, Nigeria
3 Department of Computer Science, Faculty of Information and Communication Sciences, University of Ilorin, Ilorin, 240003, Nigeria
4 Department of Telecommunication Science, University of Ilorin, Ilorin, 230003, Nigeria
5 Department of Library and Information Science, Fu Jen Catholic University, New Taipei City, 24205, Taiwan
6 Department of Computer Science and Information Engineering, Fintech and Blockchain Research Center, Asia University, Taichung City, 41354, Taiwan
7 Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos, 100213, Nigeria
8 Department of Electrical Engineering and Information Technology, Institute of Digital Communication, Ruhr University, Bochum, 44801, Germany
* Corresponding Author: Cheng-Chi Lee. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.052153
Received 25 March 2024; Accepted 24 June 2024; Published online 11 July 2024
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Securing Display Path for Security-Sensitive Applications on Mobile Devices
Jinhua Cui, Yuanyuan Zhang, Zhiping...Leveraging Logical Anchor into Topology Optimization for Indoor Wireless Fingerprinting
Lin Wang, Huixiang Liu, Wenyuan...Retinal Vessel Extraction Framework Using Modified Adaboost Extreme Learning Machine
B. V. Santhosh Krishna, T. Gnanasekaran...