Open Access
ARTICLE
Tianhua Lin1, Sijiang Xie1,*, Yalong Yan2, Jianguo Xie2, Ang Liu2
1 Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing, China
2 Institute of Information Security, Beijing Electronic Science and Technology Institute, Beijing, China
* Corresponding Author: Sijiang Xie. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2026.075573
Received 04 November 2025; Accepted 16 January 2026; Published online 01 April 2026
View
Download
Like
Robust and Reusable Fuzzy Extractors from Non-Uniform Learning with Errors Problem
Joo Woo, Jonghyun Kim, Jong Hwan...Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment
Pooja Dhiman, Santosh Kumar Henge,...Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment
Mesfer Al Duhayyim, Mohammed Maray,...Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key
Wangke Yu, Shuhua Wang