Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (32)
  • Open Access

    ARTICLE

    Blockchain-Assisted Improved Cryptographic Privacy-Preserving FL Model with Consensus Algorithm for ORAN

    Raghavendra Kulkarni1, Venkata Satya Suresh kumar Kondeti1, Binu Sudhakaran Pillai2, Surendran Rajendran3,*

    CMC-Computers, Materials & Continua, Vol.86, No.1, pp. 1-23, 2026, DOI:10.32604/cmc.2025.069835 - 10 November 2025

    Abstract The next-generation RAN, known as Open Radio Access Network (ORAN), allows for several advantages, including cost-effectiveness, network flexibility, and interoperability. Now ORAN applications, utilising machine learning (ML) and artificial intelligence (AI) techniques, have become standard practice. The need for Federated Learning (FL) for ML model training in ORAN environments is heightened by the modularised structure of the ORAN architecture and the shortcomings of conventional ML techniques. However, the traditional plaintext model update sharing of FL in multi-BS contexts is susceptible to privacy violations such as deep-leakage gradient assaults and inference. Therefore, this research presents a… More >

  • Open Access

    ARTICLE

    Securing IoT Ecosystems: Experimental Evaluation of Modern Lightweight Cryptographic Algorithms and Their Performance

    Mircea Ţălu1,2,*

    Journal of Cyber Security, Vol.7, pp. 565-587, 2025, DOI:10.32604/jcs.2025.073690 - 11 December 2025

    Abstract The rapid proliferation of Internet of Things (IoT) devices has intensified the demand for cryptographic solutions that balance security, performance, and resource efficiency. However, existing studies often focus on isolated algorithmic families, lacking a comprehensive structural and experimental comparison across diverse lightweight cryptographic designs. This study addresses that gap by providing an integrated analysis of modern lightweight cryptographic algorithms spanning six structural classes—Substitution–Permutation Network (SPN), Feistel Network (FN), Generalized Feistel Network (GFN), Addition–Rotation–XOR (ARX), Nonlinear Feedback Shift Register (NLFSR), and Hybrid models—evaluated on resource-constrained IoT platforms. The key contributions include: (i) establishing a unified benchmarking… More >

  • Open Access

    ARTICLE

    Implementation and Evaluation of the Zero-Knowledge Protocol for Identity Card Verification

    Edward Danso Ansong*, Simon Bonsu Osei*, Raphael Adjetey Adjei

    Journal of Cyber Security, Vol.7, pp. 533-564, 2025, DOI:10.32604/jcs.2025.061821 - 11 December 2025

    Abstract The surge in identity fraud, driven by the rapid adoption of mobile money, internet banking, and e-services during the COVID-19 pandemic, underscores the need for robust cybersecurity solutions. Zero-Knowledge Proofs (ZKPs) enable secure identity verification by allowing individuals to prove possession of a National ID card without revealing sensitive information. This study implements a ZKP-based identity verification system using Camenisch-Lysyanskaya (CL) signatures, reducing reliance on complex trusted setup ceremonies. While a trusted issuer is still required, as assumed in this work, our approach eliminates the need for broader system-wide trusted parameters. We evaluate the system’s More >

  • Open Access

    ARTICLE

    Phase-Level Analysis and Forecasting of System Resources in Edge Device Cryptographic Algorithms

    Ehan Sohn1, Sangmyung Lee1, Sunggon Kim1, Kiwook Sohn1, Manish Kumar2, Yongseok Son3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.2, pp. 2761-2785, 2025, DOI:10.32604/cmes.2025.070888 - 26 November 2025

    Abstract With the accelerated growth of the Internet of Things (IoT), real-time data processing on edge devices is increasingly important for reducing overhead and enhancing security by keeping sensitive data local. Since these devices often handle personal information under limited resources, cryptographic algorithms must be executed efficiently. Their computational characteristics strongly affect system performance, making it necessary to analyze resource impact and predict usage under diverse configurations. In this paper, we analyze the phase-level resource usage of AES variants, ChaCha20, ECC, and RSA on an edge device and develop a prediction model. We apply these algorithms… More >

  • Open Access

    REVIEW

    Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission

    Michael Juma Ayuma1,*, Shem Mbandu Angolo1, Philemon Nthenge Kasyoka2, Simon Maina Karume3

    Journal of Cyber Security, Vol.7, pp. 307-341, 2025, DOI:10.32604/jcs.2025.067360 - 02 September 2025

    Abstract Token transmission is a fundamental component in diverse domains, including computer networks, blockchain systems, distributed architectures, financial transactions, secure communications, and identity verification. Ensuring optimal performance during transmission is essential for maintaining the efficiency of data in transit. However, persistent threats from adversarial actors continue to pose significant risks to the integrity, authenticity, and confidentiality of transmitted data. This study presents a comprehensive review of existing research on token transmission techniques, examining the roles of transmission channels, emerging trends, and the associated security and performance implications. A critical analysis is conducted to assess the strengths, More >

  • Open Access

    ARTICLE

    Sine-Polynomial Chaotic Map (SPCM): A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks

    David S. Bhatti1,*, Annas W. Malik2, Haeung Choi1, Ki-Il Kim3,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2157-2177, 2025, DOI:10.32604/cmc.2025.068360 - 29 August 2025

    Abstract Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies, limiting their use for lightweight, secure image encryption in resource-constrained Wireless Sensor Networks (WSNs). We propose the SPCM, a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions, leveraging a piecewise function to achieve a broad chaotic range () and a high Lyapunov exponent (5.04). Validated through nine benchmarks, including standard randomness tests, Diehard tests, and Shannon entropy (3.883), SPCM demonstrates superior randomness and high sensitivity to initial conditions. Applied to image encryption, SPCM achieves 0.152582 s (39% faster than some techniques) and 433.42 More >

  • Open Access

    ARTICLE

    Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security

    Sunil K. Singh1, Sudhakar Kumar1,*, Manraj Singh1, Savita Gupta2, Razaz Waheeb Attar3, Varsha Arya4,5, Ahmed Alhomoud6, Brij B. Gupta7,8,9

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3927-3941, 2025, DOI:10.32604/cmc.2025.059643 - 03 July 2025

    Abstract As quantum computing continues to advance, traditional cryptographic methods are increasingly challenged, particularly when it comes to securing critical systems like Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential for monitoring and controlling industrial operations, making their security paramount. A key threat arises from Shor’s algorithm, a powerful quantum computing tool that can compromise current hash functions, leading to significant concerns about data integrity and confidentiality. To tackle these issues, this article introduces a novel Quantum-Resistant Hash Algorithm (QRHA) known as the Modular Hash Learning Algorithm (MHLA). This algorithm is meticulously crafted… More >

  • Open Access

    ARTICLE

    Analysis of Innovative Quantum Optimization Solutions for Shor’s Period Finding Algorithm Applied to the Computation of

    Kaleb Dias Antoine KODO1,*, Eugène C. EZIN1,2

    Journal of Quantum Computing, Vol.7, pp. 17-38, 2025, DOI:10.32604/jqc.2025.059089 - 08 April 2025

    Abstract In the rapidly evolving domain of quantum computing, Shor’s algorithm has emerged as a groundbreaking innovation with far-reaching implications for the field of cryptographic security. However, the efficacy of Shor’s algorithm hinges on the critical step of determining the period, a process that poses a substantial computational challenge. This article explores innovative quantum optimization solutions that aim to enhance the efficiency of Shor’s period finding algorithm. The article focuses on quantum development environments, such as Qiskit and Cirq. A detailed analysis is conducted on three notable tools: Qiskit Transpiler, BQSKit, and Mitiq. The performance of More >

  • Open Access

    ARTICLE

    Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives

    Maher Alharby*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2449-2463, 2024, DOI:10.32604/cmc.2024.050425 - 15 May 2024

    Abstract Cloud computing has emerged as a viable alternative to traditional computing infrastructures, offering various benefits. However, the adoption of cloud storage poses significant risks to data secrecy and integrity. This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology, smart contracts, and cryptographic primitives. The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data. To preserve data secrecy, symmetric encryption systems are employed to encrypt user data before outsourcing it. An extensive More >

  • Open Access

    ARTICLE

    Securing Mobile Cloud-Based Electronic Health Records: A Blockchain-Powered Cryptographic Solution with Enhanced Privacy and Efficiency

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Journal of Intelligent Medicine and Healthcare, Vol.2, pp. 15-34, 2024, DOI:10.32604/jimh.2024.048784 - 11 April 2024

    Abstract The convergence of handheld devices and cloud-based computing has transformed how Electronic Health Records (EHRs) are stored in mobile cloud paradigms, offering benefits such as affordability, adaptability, and portability. However, it also introduces challenges regarding network security and data confidentiality, as it aims to exchange EHRs among mobile users while maintaining high levels of security. This study proposes an innovative blockchain-based solution to these issues and presents secure cloud storage for healthcare data. To provide enhanced cryptography, the proposed method combines an enhanced Blowfish encryption method with a new key generation technique called Elephant Herding… More >

Displaying 1-10 on page 1 of 32. Per Page