Open Access
ARTICLE
Jeng-Shyang Pan1,2, Na Yu1, Shu-Chuan Chu1,*, An-Ning Zhang1, Bin Yan3, Junzo Watada4
1 College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, 266590, China
2 Department of Information Management, Chaoyang University of Technology, Taichung, 41349, Taiwan
3 College of Electronics, Communication and Physics, Shandong University of Science and Technology, Qingdao, 266590, China
4 Graduate School of Information, Production and Systems, Waseda University, Kitakyushu, 808-0135, Japan
* Corresponding Author: Shu-Chuan Chu. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.058450
Received 12 September 2024; Accepted 20 November 2024; Published online 09 December 2024
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...