Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (163)
  • Open Access

    ARTICLE

    Blockchain-Based Data Acquisition with Privacy Protection in UAV Cluster Network

    Lemei Da1, Hai Liang1,*, Yong Ding1,2, Yujue Wang1, Changsong Yang1, Huiyong Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 879-902, 2023, DOI:10.32604/cmes.2023.026309

    Abstract The unmanned aerial vehicle (UAV) self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale, which can quickly and accurately complete complex tasks such as path planning, situational awareness, and information transmission. Due to the openness of the network, the UAV cluster is more vulnerable to passive eavesdropping, active interference, and other attacks, which makes the system face serious security threats. This paper proposes a Blockchain-Based Data Acquisition (BDA) scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition scenario. Each UAV cluster has an… More >

  • Open Access

    ARTICLE

    Image Splicing Detection Using Generalized Whittaker Function Descriptor

    Dumitru Baleanu1,2,3, Ahmad Sami Al-Shamayleh4, Rabha W. Ibrahim5,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3465-3477, 2023, DOI:10.32604/cmc.2023.037162

    Abstract Image forgery is a crucial part of the transmission of misinformation, which may be illegal in some jurisdictions. The powerful image editing software has made it nearly impossible to detect altered images with the naked eye. Images must be protected against attempts to manipulate them. Image authentication methods have gained popularity because of their use in multimedia and multimedia networking applications. Attempts were made to address the consequences of image forgeries by creating algorithms for identifying altered images. Because image tampering detection targets processing techniques such as object removal or addition, identifying altered images remains a major challenge in research.… More >

  • Open Access

    ARTICLE

    Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing

    Maryam Alhassan, Abdul Raouf Khan*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2727-2740, 2023, DOI:10.32604/cmc.2023.037129

    Abstract Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture to ensure that sensitive information is protected and kept secure throughout the communication. Simultaneously, efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource constrained. This study proposes a lightweight and efficient authentication scheme for the UAV-assisted MEC environment. The proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardware-based solution with a… More >

  • Open Access

    ARTICLE

    Blockchain-Based Decentralized Authentication Model for IoT-Based E-Learning and Educational Environments

    Osama A. Khashan1,*, Sultan Alamri2, Waleed Alomoush3, Mutasem K. Alsmadi4, Samer Atawneh2, Usama Mir5

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3133-3158, 2023, DOI:10.32604/cmc.2023.036217

    Abstract In recent times, technology has advanced significantly and is currently being integrated into educational environments to facilitate distance learning and interaction between learners. Integrating the Internet of Things (IoT) into education can facilitate the teaching and learning process and expand the context in which students learn. Nevertheless, learning data is very sensitive and must be protected when transmitted over the network or stored in data centers. Moreover, the identity and the authenticity of interacting students, instructors, and staff need to be verified to mitigate the impact of attacks. However, most of the current security and authentication schemes are centralized, relying… More >

  • Open Access

    ARTICLE

    Grey Wolf-Based Method for an Implicit Authentication of Smartphone Users

    Abdulwahab Ali Almazroi, Mohamed Meselhy Eltoukhy*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3729-3741, 2023, DOI:10.32604/cmc.2023.036020

    Abstract Smartphones have now become an integral part of our everyday lives. User authentication on smartphones is often accomplished by mechanisms (like face unlock, pattern, or pin password) that authenticate the user’s identity. These technologies are simple, inexpensive, and fast for repeated logins. However, these technologies are still subject to assaults like smudge assaults and shoulder surfing. Users’ touch behavior while using their cell phones might be used to authenticate them, which would solve the problem. The performance of the authentication process may be influenced by the attributes chosen (from these behaviors). The purpose of this study is to present an… More >

  • Open Access

    ARTICLE

    A Privacy-Preserving System Design for Digital Presence Protection

    Eric Yocam1, Ahmad Alomari2, Amjad Gawanmeh3,*, Wathiq Mansoor3

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3091-3110, 2023, DOI:10.32604/cmc.2023.032826

    Abstract A person’s privacy has become a growing concern, given the nature of an expansive reliance on real-time video activities with video capture, stream, and storage. This paper presents an innovative system design based on a privacy-preserving model. The proposed system design is implemented by employing an enhanced capability that overcomes today’s single parameter-based access control protection mechanism for digital privacy preservation. The enhanced capability combines multiple access control parameters: facial expression, resource, environment, location, and time. The proposed system design demonstrated that a person’s facial expressions combined with a set of access control rules can achieve a person’s privacy-preserving preferences.… More >

  • Open Access

    ARTICLE

    Secured Framework for Assessment of Chronic Kidney Disease in Diabetic Patients

    Sultan Mesfer Aldossary*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3387-3404, 2023, DOI:10.32604/iasc.2023.035249

    Abstract With the emergence of cloud technologies, the services of healthcare systems have grown. Simultaneously, machine learning systems have become important tools for developing matured and decision-making computer applications. Both cloud computing and machine learning technologies have contributed significantly to the success of healthcare services. However, in some areas, these technologies are needed to provide and decide the next course of action for patients suffering from diabetic kidney disease (DKD) while ensuring privacy preservation of the medical data. To address the cloud data privacy problem, we proposed a DKD prediction module in a framework using cloud computing services and a data… More >

  • Open Access

    ARTICLE

    Improved Siamese Palmprint Authentication Using Pre-Trained VGG16-Palmprint and Element-Wise Absolute Difference

    Mohamed Ezz, Waad Alanazi, Ayman Mohamed Mostafa*, Eslam Hamouda, Murtada K. Elbashir, Meshrif Alruily

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2299-2317, 2023, DOI:10.32604/csse.2023.036567

    Abstract Palmprint identification has been conducted over the last two decades in many biometric systems. High-dimensional data with many uncorrelated and duplicated features remains difficult due to several computational complexity issues. This paper presents an interactive authentication approach based on deep learning and feature selection that supports Palmprint authentication. The proposed model has two stages of learning; the first stage is to transfer pre-trained VGG-16 of ImageNet to specific features based on the extraction model. The second stage involves the VGG-16 Palmprint feature extraction in the Siamese network to learn Palmprint similarity. The proposed model achieves robust and reliable end-to-end Palmprint… More >

  • Open Access

    ARTICLE

    Lattice-Based Authentication Scheme to Prevent Quantum Attack in Public Cloud Environment

    Naveed Khan1, Zhang Jianbiao1, Intikhab Ullah2, Muhammad Salman Pathan3, Huhnkuk Lim4,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 35-49, 2023, DOI:10.32604/cmc.2023.036189

    Abstract Public cloud computing provides a variety of services to consumers via high-speed internet. The consumer can access these services anytime and anywhere on a balanced service cost. Many traditional authentication protocols are proposed to secure public cloud computing. However, the rapid development of high-speed internet and organizations’ race to develop quantum computers is a nightmare for existing authentication schemes. These traditional authentication protocols are based on factorization or discrete logarithm problems. As a result, traditional authentication protocols are vulnerable in the quantum computing era. Therefore, in this article, we have proposed an authentication protocol based on the lattice technique for… More >

  • Open Access

    ARTICLE

    Attribute-Based Authentication Scheme from Partial Encryption for Lattice with Short Key

    Wangke Yu, Shuhua Wang*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 67-80, 2023, DOI:10.32604/cmc.2023.035337

    Abstract Wireless network is the basis of the Internet of things and the intelligent vehicle Internet. Due to the complexity of the Internet of things and intelligent vehicle Internet environment, the nodes of the Internet of things and the intelligent vehicle Internet are more vulnerable to malicious destruction and attacks. Most of the proposed authentication and key agreement protocols for wireless networks are based on traditional cryptosystems such as large integer decomposition and elliptic curves. With the rapid development of quantum computing, these authentication protocols based on traditional cryptography will be more and more threatened, so it is necessary to design… More >

Displaying 21-30 on page 3 of 163. Per Page