Open Access
ARTICLE
Walaa Alayed1, Asad Ur Rehman2, M.Awais Ehsan3, Waqar Ul Hassan4, Ahmed Zeeshan5,6,*
1 Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia
2 Department of Mathematics, Capital University of Science & Technology (CUST), Islamabad, Pakistan
3 School of Natural Sciences, National University of Science and Technology, Islamabad, Pakistan
4 Department of Mathematics, Government College University, Lahore, Pakistan
5 Department of Mathematics & Statistics, Faculty of Science, International Islamic University Islamabad, H-10, Islamabad, Pakistan
6 Department of Mathematics, College of Science, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul, Republic of Korea
* Corresponding Author: Ahmed Zeeshan. Email:
(This article belongs to the Special Issue: Advances in Secure Computing: Post-Quantum Security, Multimedia Encryption, and Intelligent Threat Defence)
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.078078
Received 23 December 2025; Accepted 26 February 2026; Published online 27 March 2026
View
Download
Like
Privacy Data Management Mechanism Based on Blockchain and Federated Learning
Mingsen Mo, Shan Ji, Xiaowan Wang,...A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT
Yu Fan, Jingbing Li, Uzair Aslam...Secure and Optimal LOADng Routing for IoT with Composite Routing Metric
Divya Sharma, Sanjay Jain, Vivek...Quantum Oblivious Transfer with Reusable Bell State
Shu-Yu Kuo, Kuo-Chun Tseng, Yao-Hsin...Jellyfish Search Optimization with Deep Learning Driven Autism Spectrum Disorder Classification
S. Rama Sree, Inderjeet Kaur,...