Open Access
REVIEW
Nidhika Chauhan1, Navneet Kaur2, Kamaljit Singh Saini2, Sahil Verma3, Abdulatif Alabdulatif4, Ruba Abu Khurma5,7, Maribel Garcia-Arenas6, Pedro A. Castillo6,*
1 University Institute of Computing, Chandigarh University, Punjab, 143001, India
2 Department of Computer Science and Engineering, Chandigarh University, Punjab, 143001, India
3 Department of Computer Science and Engineering, Uttaranchal University, Uttarakhand, 248007, India
4 Department of Computer Science, College of Computer Qassim University, Buraydah, 52571, Saudi Arabia
5 MEU Research Unit, Faculty of Information Technology, Middle East University, Amman, 11831, Jordan
6 Department of Computer Engineering, Automatics and Robotics, University of Granada, Granada, 18071, Spain
7 Applied Science Research Center, Applied Science Private University, Amman, 11931, Jordan
* Corresponding Author: Pedro A. Castillo. Email:
Computer Systems Science and Engineering https://doi.org/10.32604/csse.2024.042690
Received 08 June 2023; Accepted 12 December 2023; Published online 14 March 2024
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...