Open Access
REVIEW
Sghaier Guizani1,*, Tehseen Mazhar2,3,*, Habib Hamam4,5,6,7
1 College of Engineering, Alfaisal University, Riyadh, 11533, Saudi Arabia
2 School of Computer Science, National College of Business Administration and Economics, Lahore, 54000, Pakistan
3 Department of Computer Science and Information Technology, School Education Department, Government of Punjab, Layyah, 31200, Pakistan
4 Faculty of Engineering, Uni de Moncton, Moncton, NB E1A3E9, Canada
5 School of Electrical Engineering, University of Johannesburg, Johannesburg, 2006, South Africa
6 International Institute of Techno. & Management (IITG), Avenue des Grandes Ecoles, Libreville, 1989, Gabon
7 Bridges for Academic Excellence—Spectrum, Tunis, Center-ville, 1001, Tunisia
* Corresponding Author: Sghaier Guizani. Email: ; Tehseen Mazhar. Email:
(This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2025.073883
Received 27 September 2025; Accepted 18 November 2025; Published online 09 December 2025
View
Download
Like
Novel Quantum Algorithms to Minimize Switching Functions Based on Graph Partitions
Peng Gao, Marek Perkowski, Yiwei...A Quantum Algorithm for Evaluating the Hamming Distance
Mohammed Zidan, Manal G. Eldin,...Fed-DFE: A Decentralized Function Encryption-Based Privacy-Preserving Scheme for Federated Learning
Zhe Sun, Jiyuan Feng, Lihua Yin,...