Open Access
ARTICLE
Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3
1 Hunan University of Science and Technology, Xiangtan, 411201, China
2 Hunan University, Changsha, 410006, China
3 School of Information Technology, Deakin University, Geelong, 3220, Australia
* Corresponding Author: Liang Bai. Email:
Computers, Materials & Continua 2021, 67(3), 3349-3361. https://doi.org/10.32604/cmc.2021.012454
Received 30 August 2020; Accepted 19 November 2020; Issue published 01 March 2021
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...