Open Access
ARTICLE
Daojun Han1,2,3, Jinyu Chen3,4, Lei Zhang1,2,3,*, Yatian Shen1,2,3, Yihua Gao3,5, Xueheng Wang3,6
1 Henan Key Laboratory of Big Data Analysis and Processing, Henan University, Kaifeng, 47500, China
2 Institute of Data and Knowledge Engineering, Henan University, Kaifeng, 47500, China
3 School of Computer and Information Engineering, Henan University, Kaifeng, 47500, China
4 Department of Network and Finance, Agricultural Bank of China Limited Xuchang Branch, Xuchang, 461000, China
5 School of Software, Pingdingshan University, Pingdingshan, 467000, China
6 Department of Network and Finance, Agricultural Bank of China Limited Nanyang Branch, Nanyang, 473000, China
* Corresponding Author: Lei Zhang. Email:
(This article belongs to this Special Issue: Blockchain Security)
Computer Modeling in Engineering & Sciences 2021, 128(1), 223-245. https://doi.org/10.32604/cmes.2021.016000
Received 30 January 2021; Accepted 02 April 2021; Issue published 28 June 2021
View
Download
Like
Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...Secure Model of Medical Data Sharing for Complex Scenarios
Wei She, Yue Hu, Zhao Tian, Guoning...A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services
Dae-Young Kim, Se Dong Min, Seokhoon...