Open Access
ARTICLE
Sajid Habib Gill1, Mirza Abdur Razzaq1, Muneer Ahmad2, Fahad M. Almansour3, Ikram Ul Haq4, NZ Jhanjhi5,*, Malik Zaib Alam6, Mehedi Masud7
1 Department of Computer Science, Shah Abdul Latif University, Khairpur, 66020, Pakistan
2 Department of Information Systems, Faculty of Computer Science & Information Technology, Universiti Malaya, Kuala Lumpur, 50603, Malaysia
3 Department of Computer Science, College of Sciences and Arts in Rass, Qassim University, Buraydah, 51452, Saudi Arabia
4 School of Science, Engineering and Information Technology, Federation University, Melbourne, 3000, Australia
5 School of Computer Science and Engineering, SCE, Taylor’s University, 47500, Malaysia
6 Department of Computer and Network Engineering, College of Computer Science and Information Technology, Jazan University, Saudi Arabia
7 Department of Computer Science, College of Computers and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia
* Corresponding Author: NZ Jhanjhi. Email:
Intelligent Automation & Soft Computing 2022, 31(1), 117-128. https://doi.org/10.32604/iasc.2022.016597
Received 06 January 2021; Accepted 05 May 2021; Issue published 03 September 2021
View
Download
Like
Server-Aided Multi-Secret Sharing Scheme for Weak Computational Devices
En Zhang, Xintao Duan, Siuming...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
Yongli Tang, Huanhuan Lian, Zemao...Machine Learning Based Resource Allocation of Cloud Computing in Auction
Jixian Zhang, Ning Xie, Xuejie...