Open Access
ARTICLE
D. Stalin David1, Mamoona Anam2, Chandraprabha Kaliappan3, S. Arun Mozhi Selvi4, Dilip Kumar Sharma5, Pankaj Dadheech6, Sudhakar Sengan7,*
1 Department of Computer Science and Engineering, IFET College of Engineering, Villupuram, 605108, Tamil Nadu, India
2 Department of Computer Sciences and Software Engineering, Faculty of Basic and Applied Sciences, International Islamic University, Islamabad, Pakistan
3 Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, 638401, Tamil Nadu, India
4 Department of Computer Science Engineering, DMI St. John the Baptist University, Mangochi, Lilongwe, Malawi
5 Department of Mathematics, Jaypee University of Engineering and Technology, Guna, 473226, Madhya Pradesh, India
6 Department of Computer Science and Engineering, Swami Keshvanand Institute of Technology, Management and Gramothan (SKIT), Jaipur, 302017, Rajasthan, India
7 Department of Computer Science and Engineering, PSN College of Engineering and Technology, Tirunelveli, 627152, Tamil Nadu, India
* Corresponding Author: Sudhakar Sengan. Email:
Computers, Materials & Continua 2022, 70(2), 2581-2600. https://doi.org/10.32604/cmc.2022.020213
Received 15 May 2021; Accepted 18 June 2021; Issue published 27 September 2021
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...Inverted XML Access Control Model Based on Ontology Semantic Dependency
Meijuan Wang, Jian Wang, Lihong...