Open Access
Bo Mi1, Yuan Weng1, Darong Huang1,*, Yang Liu1, Yuqing Gan2
1 Institute of Information Science and Engineering, Chongqing Jiaotong University, Chongqing, 400074, China
2 Electrical and Electronics Engineering Department, The University of Sheffield, Sheffield, S102TT, United Kingdom
* Corresponding Author: Darong Huang. Email:
Computer Systems Science and Engineering 2021, 39(2), 265-274. https://doi.org/10.32604/csse.2021.017507
Received 01 February 2021; Accepted 16 March 2021; Issue published 20 July 2021
View
Download
Like
Phishing Detection with Image Retrieval Based on Improved Texton Correlation Descriptor
Guoyuan Lin, Bowen Liu, Pengcheng...Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
Zhiliang Deng, Yongjun Ren, Yepeng...A Blockchain-Based Authentication Protocol for WLAN Mesh Security Access
Xin Jiang, Mingzhe Liu, Chen Yang,...Secure Model of Medical Data Sharing for Complex Scenarios
Wei She, Yue Hu, Zhao Tian, Guoning...A DPN (Delegated Proof of Node) Mechanism for Secure Data Transmission in IoT Services
Dae-Young Kim, Se Dong Min, Seokhoon...