Open Access
ARTICLE
Xiaodong Zhang1, Wenhan Hou2,*, Juanjuan Wang3, Leixiao Li1, Pengfei Yue1
1 Inner Mongolia Key Laboratory of Beijiang Cyberspace Security, College of Intelligent Science and Technology, Inner Mongolia University of Technology, Hohhot, 010051, China
2 School of Computer and Control Engineering, Yantai University, Yantai, 264000, China
3 College of Computer Science, Inner Mongolia University, Hohhot, 010021, China
* Corresponding Author: Wenhan Hou. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.072384
Received 26 August 2025; Accepted 13 October 2025; Published online 07 November 2025
View
Download
Like
Blockchain Based Enhanced ERP Transaction Integrity Architecture and PoET Consensus
Tehreem Aslam, Ayesha Maqbool,...Droid-IoT: Detect Android IoT Malicious Applications Using ML and Blockchain
Hani Mohammed AlshahraniA Novel Database Watermarking Technique Using Blockchain as Trusted Third Party
Ahmed S. Alghamdi, Surayya Naz,...Blockchain-Based SQKD and IDS in Edge Enabled Smart Grid Network
Abdullah Musaed Alkhiari, Shailendra...Integrating Blockchain Technology into Healthcare Through an Intelligent Computing Technique
Asif Irshad Khan, Abdullah Saad...