Su, Yining
Wang, Xingyuan
Unar, Salahuddin
Zhao, Xiu
Liu, Pengbo
Funding for this research was provided by:
the National Natural Science Foundation of China (No: 61672124)
the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (No: MMJJ20170203)
Liaoning Province Science and Technology Innovation Leading Talents Program Project (No: XLYC1802013)
Key RandD Projects of Liaoning Province (No: 2019020105-JH2/103)
Jinan City ‘20 universities’ Funding Projects Introducing Innovation Team Program (No: 2019GXRC031)
Research Fund of Guangxi Key Lab of Multi-source Information Mining and Security (No: MIMS20-M-02)
Article History
Received: 30 May 2022
Accepted: 22 September 2022
First Online: 9 November 2022
Declarations
:
: The authors declare that they have no conflicts of interest.