Open Access
ARTICLE
Hao Sun*, Xiubo Chen, Kaiguo Yuan
Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
* Corresponding Author: Hao Sun. Email:
(This article belongs to the Special Issue: Security, Privacy, and Robustness for Trustworthy AI Systems)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.049159
Received 29 December 2023; Accepted 27 March 2024; Published online 24 April 2024
View
Download
Like
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing
Zhen Yang, Yongfeng Huang, Xing...A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption
Wenjia Xu, Shijun Xiang, Vasily...Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
Weidong Fang, Wuxiong Zhang, QianQian...A Privacy Preserving Deep Linear Regression Scheme Based on Homomorphic Encryption
Danping Dong, Yue Wu, Lizhi Xiong,...