Open Access
ARTICLE
Yi Li1, Wenying Zheng2, Yu-Sheng Su3,4,5,*, Meiqin Tang6
1 School of Computer Science, Nanjing University of Information Science and Technology, Nanjing, 210044, China
2 School of Computer Science and Technology (School of Artificial Intelligence), Zhejiang Sci-Tech University, Hangzhou, 310018, China
3 Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, 621301, Taiwan
4 Advanced Institute of Manufacturing with High-tech Innovations, National Chung Cheng University, Chiayi, 621301, Taiwan
5 Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung, 202301, Taiwan
6 School of Integrated Circuits, Wuxi Vocational College of Science and Technology, Wuxi, 214028, China
* Corresponding Author: Yu-Sheng Su. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.059949
Received 21 October 2024; Accepted 25 February 2025; Published online 26 March 2025
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...