Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (50)
  • Open Access

    ARTICLE

    Securing Fog Computing For E-Learning System Using Integration of Two Encryption Algorithms

    Hind A. Alshambri1,* Fawaz Alassery2

    Journal of Cyber Security, Vol.3, No.3, pp. 149-166, 2021, DOI:10.32604/jcs.2021.022112

    Abstract Currently, the majority of institutions have made use of information technologies to improve and develop their diverse educational methods to attract more learners. Through information technologies, e-learning and learning-on-the go have been adopted by the institutions to provide affordability and flexibility of educational services. Most of the educational institutes are offering online teaching classes using the technologies like cloud computing, networking, etc. Educational institutes have developed their e-learning platforms for the online learning process, through this way they have paved the way for distance learning. But e-learning platform has to face a lot of security challenges in terms of cyberattacks… More >

  • Open Access

    ARTICLE

    Lightweight and Secure Mutual Authentication Scheme for IoT Devices Using CoAP Protocol

    S. Gladson Oliver1,*, T. Purusothaman2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 767-780, 2022, DOI:10.32604/csse.2022.020888

    Abstract Internet of things enables every real world objects to be seamlessly integrated with traditional internet. Heterogeneous objects of real world are enhanced with capability to communicate, computing capabilities and standards to interoperate with existing network and these entities are resource constrained and vulnerable to various security attacks. Huge number of research works are being carried out to analyze various possible attacks and to propose standards for securing communication between devices in internet of things (IoT). In this article, a robust and lightweight authentication scheme for mutual authentication between client and server using constrained application protocol is proposed. Internet of things… More >

  • Open Access

    ARTICLE

    An Efficient AES 32-Bit Architecture Resistant to Fault Attacks

    Hassen Mestiri1,2,3,*, Imen Barraj4,5, Abdullah Alsir Mohamed1, Mohsen Machhout3

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3667-3683, 2022, DOI:10.32604/cmc.2022.020716

    Abstract The Advanced Encryption Standard cryptographic algorithm, named AES, is implemented in cryptographic circuits to ensure high security level to any system which required confidentiality and secure information exchange. One of the most effective physical attacks against the hardware implementation of AES is fault attacks which can extract secret data. Until now, a several AES fault detection schemes against fault injection attacks have been proposed. In this paper, so as to ensure a high level of security against fault injection attacks, a new efficient fault detection scheme based on the AES architecture modification has been proposed. For this reason, the AES… More >

  • Open Access

    ARTICLE

    Improved RC6 Block Cipher Based on Data Dependent Rotations

    Osama S. Faragallah1,*, Ibrahim F. Elashry2, Ahmed AlGhamdi3, Walid El-Shafai4, S. El-Rabaie4, Fathi E. Abd El-Samie4, Hala S. El-sayed5, Mohamed A. Elaskily6

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1921-1934, 2022, DOI:10.32604/cmc.2022.019798

    Abstract This paper introduces an Improved RC6 (IRC6) cipher for data encryption based on data-dependent rotations. The proposed scheme is designed with the potential of meeting the needs of the Advanced Encryption Standard (AES). Four parameters are used to characterize the proposed scheme. These parameters are the size of the word (w) in bits, the number of rounds (r), the length of the secret key (b) in bytes, and the size of the block (L) in bits. The main feature of IRC6 is the variable number of working registers instead of just four registers as in RC6, resulting in a variable… More >

  • Open Access

    ARTICLE

    ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing

    Jamal Kh-Madhloom1,2,*, Mohd Khanapi Abd Ghani1, Mohd Rizuan Baharon1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 493-512, 2021, DOI:10.32604/iasc.2021.015129

    Abstract Over the decades, protecting the privacy of a health cloud using the design of a fog computing network is a very important field and will be more important in the near future. Current Internet of Things (IoT) research includes security and privacy due to their extreme importance in any growing technology that involves the implementation of cryptographic Internet communications (ICs) for protected IC applications such as fog computing and cloud computing devices. In addition, the implementation of public-key cryptography for IoT-based DNA sequence testing devices requires considerable expertise. Any key can be broken by using a brute-force attack with ample… More >

  • Open Access

    ARTICLE

    Genome-wide Analysis of a Plant AT-rich Sequence and Zinc-binding Protein (PLATZ) in Triticum Aestivum

    Xiaohang He1, Minjie Liu2, Zhengwu Fang1, Dongfang Ma1,2,3,*, Yilin Zhou1,3,*, Junliang Yin1

    Phyton-International Journal of Experimental Botany, Vol.90, No.3, pp. 971-986, 2021, DOI:10.32604/phyton.2021.012726

    Abstract Plant AT-rich sequence and zinc-binding protein (PLATZ) is a plant transcription factor that has been studied in corn. PLATZ can non-specifically bind to sequences rich in A/T bases to induce transcriptional repression. It is involved in the regulation of dehydration tolerance in seeds. In this study, we performed bioinformatics analysis to identify and characterize wheat PLATZ(TaPLATZ)genes. We identified 49 wheat PLATZ genes by searching the wheat genome by using known PLATZ gene sequences from rice, Arabidopsis, and maize. Phylogenetic analysis on PLATZ gene sequences from different species was performed. We found that PLATZs could be divided into three groups. The… More >

  • Open Access

    ARTICLE

    Antifeedant Activity of Caesalpinia coriaria Essential Oil Against Incisitermes marginipennis (Latreille)

    Cesar B. Ramírez-López1,2, Rita Beltrán-Sánchez1, Alistair Hernández-Izquierdo1, José Luis SalvadorHernández1, Eduardo Salcedo-Pérez2, Rosa E. del Río1, Mauro M. Martínez Pacheco1,*

    Phyton-International Journal of Experimental Botany, Vol.90, No.3, pp. 907-920, 2021, DOI:10.32604/phyton.2021.013775

    Abstract This study scrutinized the possibility of finding toxicant or deterrent plant metabolites against the dry wood termite Incisitermes marginipennis (Latreille). Plant deterrent agents act as repellents or antifeedants to prevent wood decay and increase its useful life. The potential of the tree Caesalpinia coriaria (Fabaceae) as a biological source of molecules with deterrent effects against the dry wood termite was assessed by a phytochemical fractionation guided by repellence and antifeedant activities. The gas chromatography-mass spectrometry analysis of the leaf essential oil showed geraniol to be one of the major components and its repellent and antifeedant effects were determined. Geraniol had… More >

  • Open Access

    ARTICLE

    Intention to Use Mobile Augmented Reality in the Tourism Sector

    Malik Khlaif Gharaibeh1, Natheer Khlaif Gharaibeh2,*, Mohammad Ayoub Khan3, Waleed Abdel karim Abu-ain4, Musab Kasim Alqudah2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 187-202, 2021, DOI:10.32604/csse.2021.014902

    Abstract This article examines the main variables that influence the intention to use Augmented Reality (AR) applications in the tourism sector in Jordan. The study model has been constructed based on the unified theory of acceptance and the use of technology2 (UTAUT2), by incorporating a new construct (aesthetics) to explore the usage intention of Mobile Augmented Reality in Tourism (MART). A questionnaire was used and distributed to a sample of 450 participants. Data were analyzed using the Smart PLS version 3.0. for testing 12 hypotheses. 29 measurement items were carefully reviewed based on previous studies that were selected to assess the… More >

  • Open Access

    ARTICLE

    Effect of Pre-Anthesis Drought Hardening on Post-Anthesis Physiological Characteristics, Yield and WUE in Winter Wheat

    Ruitao Lou1, Daoxi Li1,*, Yanbin Li1, Zepeng Bian1, Yanan Zhu2

    Phyton-International Journal of Experimental Botany, Vol.90, No.1, pp. 245-257, 2021, DOI:10.32604/phyton.2020.014073

    Abstract A drought event can cause yield loss or entire crops to fail. In order to study the effects of continuous drought on physiological characteristics, yield, and water use efficiency (WUE) of winter wheat (Triticum aestivum L.), the variety “Zhoumai 22” was grown in controlled water conditions of the pot-planted winter wheat under a mobile rainout shelter. Foot planting and safe wintering were used to evaluate, winter wheat under different drought conditions, including light, moderate and severe drought at the jointing, heading, and filling stages. The soil water content was controlled at 60–70%, 50–60%, or 40–50% of field capacity. Experimental trials… More >

  • Open Access

    ARTICLE

    Emotion-Based Painting Image Display System

    Taemin Lee1, Dongwann Kang2, Kyunghyun Yoon1, Sanghyun Seo3,*

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 181-192, 2020, DOI:10.31209/2019.100000139

    Abstract As mobile devices have tremendously developed, people can now get sensor data easily. These data are not only physical data such as temperature, humidity, gravity, acceleration, etc. but also human health data such as blood pressure, heart pulse rate, etc. With this information, Internet of Things (IoT) technology has provided many systems to support human health care. Systems for human health care support physical health care like checking blood pressure, pulse rate, etc. However, the demand for physical health care as well as mental health care is increasing. So, a system, which automatically recommends a painting to users based on… More >

Displaying 21-30 on page 3 of 50. Per Page