Open Access
ARTICLE
Gang Xu1,2,6, Xinyu Fan1, Xiu-Bo Chen2, Xin Liu4, Zongpeng Li5, Yanhui Mao6,7, Kejia Zhang3,*
1 School of Information Science and Technology, North China University of Technology, Beijing, 100144, China
2 State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
3 School of Mathematical Science, Heilongjiang University, Harbin, 150080, China
4 School of Digtial and Intelligence Industry, Inner Mongolia University of Science and Technology, Baotou, 014010, China
5 Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing, 100084, China
6 Yunnan Key Laboratory of Blockchain Application Technology, Kunming, 650233, China
7 Yunnan Innovation Institute of Beihang University, Kunming, 650233, China
* Corresponding Author: Kejia Zhang. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.057882
Received 29 August 2024; Accepted 08 November 2024; Published online 09 December 2024
View
Download
Like
A Fuzzy Approach for an IoT-based Automated Employee Performance Appraisal
Jaideep Kaur, Kamaljit KaurPhishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Fair Blind Signature Scheme to Revoke Malicious Vehicles in VANETs
Xiaoliang Wang, Jianming Jiang,...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...