Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (38)
  • Open Access

    ARTICLE

    A Secure Energy Internet Scheme for IoV Based on Post-Quantum Blockchain

    Jiansheng Zhang1, Yang Xin1,*, Yuyan Wang2, Xiaohui Lei2, Yixian Yang1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6323-6336, 2023, DOI:10.32604/cmc.2023.034668

    Abstract With the increasing use of distributed electric vehicles (EV), energy management in the Internet of vehicles (IoV) has attracted more attention, especially demand response (DR) management to achieve efficient energy management in IoV. Therefore, it is a tendency to introduce distributed energy such as renewable energy into the existing supply system. For optimizing the energy internet (EI) for IoV, in this paper, we introduce blockchain into energy internet and propose a secure EI scheme for IoV based on post-quantum blockchain, which provides the new information services and an incentive cooperation mechanism for the current energy IoV system. Firstly, based on… More >

  • Open Access

    ARTICLE

    BIoMT: A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things

    Sahar Badri1, Sana Ullah Jan2,*, Daniyal Alghazzawi1, Sahar Aldhaheri1, Nikolaos Pitropakis2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3667-3684, 2023, DOI:10.32604/csse.2023.037531

    Abstract Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things (IoMT). The existing cloud-based, centralized IoMT architectures are vulnerable to multiple security and privacy problems. The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks. This article presents a private and easily expandable blockchain-based framework for the IoMT. The proposed framework contains several participants, including private blockchain, hospital management systems, cloud service providers, doctors, and patients. Data security is ensured by incorporating an attribute-based encryption scheme. Furthermore,… More >

  • Open Access

    ARTICLE

    Mechanisms Influencing Learning Gains Under Information Security: Structural Equation Modeling with Mediating Effect

    Teng Zong1,2,*, Fengsi Wang3, Xin Wei2, Yibo Liu1

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3447-3468, 2023, DOI:10.32604/iasc.2023.035456

    Abstract With the expanding enrollments in higher education, the quality of college education and the learning gains of students have attracted much attention. It is important to study the influencing factors and mechanisms of individual students’ acquisition of learning gains to improve the quality of talent cultivation in colleges. However, in the context of information security, the original data of learning situation surveys in various universities involve the security of educational evaluation data and daily privacy of teachers and students. To protect the original data, data feature mining and correlation analyses were performed at the model level. This study selected 12,181… More >

  • Open Access

    ARTICLE

    Comparative Analysis of Execution of CNN-Based Sanguine Data Transmission with LSB-SS and PVD-SS

    Alaknanda S. Patil1,*, G. Sundari1, Arun Kumar Sivaraman2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1707-1721, 2023, DOI:10.32604/csse.2023.034270

    Abstract The intact data transmission to the authentic user is becoming crucial at every moment in the current era. Steganography; is a technique for concealing the hidden message in any cover media such as image, video; and audio to increase the protection of data. The resilience and imperceptibility are improved by choosing an appropriate embedding position. This paper gives a novel system to immerse the secret information in different videos with different methods. An audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image. A hidden message is first included… More >

  • Open Access

    ARTICLE

    A Cross-Plane Color Image Encryption Algorithm Based on 1D-SLM

    Xiaohong Wang, Huiqing Wu, Yuying Ma, Shuzhen Huang*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1093-1108, 2023, DOI:10.32604/csse.2023.036652

    Abstract With the rapid development of 5G technology, it has become fast and easy for people to transmit information on the Internet. Digital images can express information more intuitively, so transmitting information through images has excellent applications. This paper uses a new chaotic system called 1D-Sin-Logistic-Map (1D-SLM). 1D-SLM has two control parameters, which can provide larger parameter space, and the parameter space in the chaotic state is continuous. Through Lyapunov exponent analysis (LE), bifurcation diagrams analysis, spectral entropy analysis (SE), and 0-1 test, it is verified that 1D-SLM has complex dynamic behavior and is very suitable for cryptography. Compared with other… More >

  • Open Access

    ARTICLE

    A New Generative Mathematical Model for Coverless Steganography System Based on Image Generation

    Al-Hussien Seddik1, Mohammed Salah2, Gamal Behery2, Ahmed El-harby2, Ahmed Ismail Ebada2, Sokea Teng3, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5087-5103, 2023, DOI:10.32604/cmc.2023.035364

    Abstract The ability of any steganography system to correctly retrieve the secret message is the primary criterion for measuring its efficiency. Recently, researchers have tried to generate a new natural image driven from only the secret message bits rather than using a cover to embed the secret message within it; this is called the stego image. This paper proposes a new secured coverless steganography system using a generative mathematical model based on semi Quick Response (QR) code and maze game image generation. This system consists of two components. The first component contains two processes, encryption process, and hiding process. The encryption… More >

  • Open Access

    ARTICLE

    Data De-identification Framework

    Junhyoung Oh1, Kyungho Lee2,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3579-3606, 2023, DOI:10.32604/cmc.2023.031491

    Abstract As technology develops, the amount of information being used has increased a lot. Every company learns big data to provide customized services with its customers. Accordingly, collecting and analyzing data of the data subject has become one of the core competencies of the companies. However, when collecting and using it, the authority of the data subject may be violated. The data often identifies its subject by itself, and even if it is not a personal information that infringes on an individual’s authority, the moment it is connected, it becomes important and sensitive personal information that we have never thought of.… More >

  • Open Access

    ARTICLE

    An Improved Text-Based and Image-Based CAPTCHA Based on Solving and Response Time

    Ademola Olusola Adesina1, Patrick Seun Ayobioloja2, Ibidun Christiana Obagbuwa3, Tola John Odule1, Adenrele A. Afolorunso2, Sunday Adeola Ajagbe4,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 2661-2675, 2023, DOI:10.32604/cmc.2023.031245

    Abstract CAPTCHA is an acronym that stands for Completely Automated Public Turing Test to tell Computers and Humans Apart (CAPTCHA), it is a good example of an authentication system that can be used to determine the true identity of any user. It serves as a security measure to prevent an attack caused by web bots (automatic programs) during an online transaction. It can come as text-based or image-based depending on the project and the programmer. The usability and robustness, as well as level of security, provided each of the varies and call for the development of an improved system. Hence, this… More >

  • Open Access

    ARTICLE

    Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem

    Lamiaa A. Abou Elazm1,2, Walid El-Shafai3,4, Sameh Ibrahim2, Mohamed G. Egila1, H. Shawkey1, Mohamed K. H. Elsaid2, Naglaa F. Soliman5, Hussah Nasser AlEisa6,*, Fathi E. Abd El-Samie3

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 929-955, 2023, DOI:10.32604/iasc.2023.031386

    Abstract Biometric security is a growing trend, as it supports the authentication of persons using confidential biometric data. Most of the transmitted data in multimedia systems are susceptible to attacks, which affect the security of these systems. Biometric systems provide sufficient protection and privacy for users. The recently-introduced cancellable biometric recognition systems have not been investigated in the presence of different types of attacks. In addition, they have not been studied on different and large biometric datasets. Another point that deserves consideration is the hardware implementation of cancellable biometric recognition systems. This paper presents a suggested hybrid cancellable biometric recognition system… More >

  • Open Access

    ARTICLE

    Quantum Oblivious Transfer with Reusable Bell State

    Shu-Yu Kuo1, Kuo-Chun Tseng2, Yao-Hsin Chou3, Fan-Hsun Tseng4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 915-932, 2023, DOI:10.32604/cmc.2023.032320

    Abstract In cryptography, oblivious transfer (OT) is an important multi-party cryptographic primitive and protocol, that is suitable for many upper-layer applications, such as secure computation, remote coin-flipping, electrical contract signing and exchanging secrets simultaneously. However, some no-go theorems have been established, indicating that one-out-of-two quantum oblivious transfer (QOT) protocols with unconditional security are impossible. Fortunately, some one-out-of-two QOT protocols using the concept of Crépeau’s reduction have been demonstrated not to conform to Lo’s no-go theorem, but these protocols require more quantum resources to generate classical keys using all-or-nothing QOT to construct one-out-of-two QOT. This paper proposes a novel and efficient one-out-of-two… More >

Displaying 1-10 on page 1 of 38. Per Page  

Share Link