Open Access
ARTICLE
Iftikhar Ahmad1,*, Ambreen Shahnaz2, Muhammad Asfand-e-Yar3, Wajeeha Khalil1, Yasmin Bano1
1 Department of Computer Science and Information Technology, University of Engineering and Technology, Peshawar, 25120, Pakistan
2 Department of Computer Science, Shaheed Benazir Bhutto Women University, Peshawar, 25000, Pakistan
3 Center of Excellence in Artificial Intelligence, Department of Computer Science, Bahria University, Islamabad, Pakistan
* Corresponding Author: Iftikhar Ahmad. Email:
Computers, Materials & Continua 2023, 74(1), 279-291. https://doi.org/10.32604/cmc.2023.031344
Received 15 April 2022; Accepted 08 June 2022; Issue published 22 September 2022
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...