Open Access
REVIEW
Zhimao Lai1,2, Saad Arif3, Cong Feng4, Guangjun Liao5, Chuntao Wang6,*
1 School of Automation, Guangdong University and Technology, Guangzhou, 510006, China
2 School of Immigration Administration (Guangzhou), China People’s Police University, Guangzhou, 510663, China
3 Department of Mechanical Engineering, College of Engineering, King Faisal University, Al Ahsa, 31982, Saudi Arabia
4 Cyber Police Division, Guangzhou Public Security Bureau, Guangzhou, 510030, China
5 School of Forensic Science and Technology, Guangdong Police College, Guangzhou, 510320, China
6 College of Mathematics and Informatics, South China Agricultural University, Guangzhou, 510642, China
* Corresponding Author: Chuntao Wang. Email:
(This article belongs to the Special Issue: Challenges and Innovations in Multimedia Encryption and Information Security)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.059370
Received 05 October 2024; Accepted 26 November 2024; Published online 13 December 2024
View
Download
Like
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing
Zhen Yang, Yongfeng Huang, Xing...Research on Public Opinion Propagation Model in Social Network Based on Blockchain
Gengxin Sun, Sheng Bin, Meng Jiang,...A Cryptographic-Based Approach for Electricity Theft Detection in Smart Grid
Khelifi Naim, Benahmed Khelifa,...Data Secure Storage Mechanism of Sensor Networks Based on Blockchain
Jin Wang, Wencheng Chen, Lei Wang,...