Open Access
ARTICLE
Ronglei Hu1, Chuce He1,2, Sihui Liu1, Dong Yao1, Xiuying Li1, Xiaoyi Duan1,*
1 Department of Electronics and Communication Engineering, Beijing Electronic Science and Technology Institute, Beijing, 100070, China
2 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, 102206, China
* Corresponding Author: Xiaoyi Duan. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.062542
Received 20 December 2024; Accepted 28 March 2025; Published online 24 April 2025
View
Download
Like
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing
Zhen Yang, Yongfeng Huang, Xing...A Cryptograph Domain Image Retrieval Method Based on Paillier Homomorphic Block Encryption
Wenjia Xu, Shijun Xiang, Vasily...Design of ECC based Secured Cloud Storage Mechanism for Transaction Rich Applications
V. Gopinath, R. S. BhuvaneswaranDynamic Proofs of Retrievability Based on Partitioning-Based Square Root Oblivious RAM
Jian Xu, Zhihao Jiang, Andi Wang,...