Open Access
ARTICLE
Jin Han1, Cheng Wang2, Jie Miao3, Mingxin Lu3, Yingchun Wang4, Jin Shi3,*
1 Nanjing University of Information Science & Technology, Nanjing, 210044, China
2 Research Institute of State Grid Hunan Electric Power Company Limited, Changsha, 410007, China
3 Nanjing University, Nanjing, 210093, China
4 Waterford Institute of Technology, Waterford City, X91 K0EK, Ireland
* Corresponding Author: Jin Shi. Email:
Computers, Materials & Continua 2021, 66(3), 2645-2654. https://doi.org/10.32604/cmc.2021.014371
Received 16 September 2020; Accepted 08 October 2020; Issue published 28 December 2020
View
Download
Like
A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
Chak Fong Cheang, Yiqin Wang,...A Block Compressed Sensing for Images Selective Encryption in Cloud
Xingting Liu, Jianming Zhang,...Research on Electronic Document Management System Based on Cloud Computing
Jin Han, Cheng Wang, Jie Miao,...