Open Access
ARTICLE
Zhen Yang1, Hongao Zhang1, Haiyang Yu1,*, Zheng Li1, Bocheng Zhu1, Richard O. Sinnott2
1 Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
2 School of Computing and Information Systems, The University of Melbourne, Victoria, 3010, Australia
* Corresponding Author: Haiyang Yu. Email:
(This article belongs to this Special Issue: Blockchain Security)
Computer Modeling in Engineering & Sciences 2021, 128(1), 269-282. https://doi.org/10.32604/cmes.2021.015210
Received 02 December 2020; Accepted 15 March 2021; Issue published 28 June 2021
View
Download
Like
Verifiable Diversity Ranking Search Over Encrypted Outsourced Data
Yuling Liu, Hua Peng, Jie WangPhishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...Secure Model of Medical Data Sharing for Complex Scenarios
Wei She, Yue Hu, Zhao Tian, Guoning...