Double auction mechanisms have been designed to trade a variety of divisible resources (e.g., electricity, mobile data, and cloud resources) among distributed agents. In such divisible double auction, all the ...
Applied Cryptography in Computer and Communications
Citation: Cybersecurity 2021 4:37
In a digital society, the rapid development of computer science and the Internet has greatly facilitated image applications. However, one of the public network also brings risks to both image tampering and pri...Citation: Cybersecurity 2021 4:34
The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while t...Citation: Cybersecurity 2021 4:23