Open Access
ARTICLE
R. Joshua Samuel Raj1, M. Varalatchoumy2, V. L. Helen Josephine3, A. Jegatheesan4, Seifedine Kadry5, Maytham N. Meqdad6, Yunyoung Nam7,*
1 Department of Information Science & Engineering, CMR Institute of Technology, Bengaluru, 560037, India
2 Department of Computer Science & Engineering, Cambridge Institute of Technology, Bengaluru, 560036, India
3 Department of Computer Applications, CMR Institute of Technology, Bengaluru, 560037, India
4 Department of Computer Science & Engineering, Swarnandhra College of Engineering and Technology, Narasapur, 534280, India
5 Department of Applied Data Science, Noroff University College, Kristiansand, 4612, Norway
6 Department of Computer Techniques Engineering, Al-Mustaqbal University College, Hillah, 51001, Iraq
7 Department of Computer Science and Engineering, Soonchunhyang University, 31538, Korea
* Corresponding Author: Yunyoung Nam. Email:
Computers, Materials & Continua 2022, 71(1), 1095-1109. https://doi.org/10.32604/cmc.2022.021859
Received 16 July 2021; Accepted 17 August 2021; Issue published 03 November 2021
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...