Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (10)
  • Open Access

    ARTICLE

    Research on IPFS Image Copyright Protection Method Based on Blockchain

    Xin Cong, Lanjin Feng*, Lingling Zi

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 663-684, 2024, DOI:10.32604/cmc.2024.054372 - 15 October 2024

    Abstract In the digital information age, distributed file storage technologies like the InterPlanetary File System (IPFS) have gained considerable traction as a means of storing and disseminating media content. Despite the advantages of decentralized storage, the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership. The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files. To this end, an innovative approach is proposed that integrates blockchain, digital signature, and blind watermarking. Blockchain technology functions as a decentralized and… More >

  • Open Access

    ARTICLE

    An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things

    Senshan Ouyang1,2, Xiang Liu2, Lei Liu2, Shangchao Wang2, Baichuan Shao3, Yang Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 903-915, 2024, DOI:10.32604/cmes.2023.028895 - 22 September 2023

    Abstract With the continuous expansion of the Industrial Internet of Things (IIoT), more and more organisations are placing large amounts of data in the cloud to reduce overheads. However, the channel between cloud servers and smart equipment is not trustworthy, so the issue of data authenticity needs to be addressed. The SM2 digital signature algorithm can provide an authentication mechanism for data to solve such problems. Unfortunately, it still suffers from the problem of key exposure. In order to address this concern, this study first introduces a key-insulated scheme, SM2-KI-SIGN, based on the SM2 algorithm. This More >

  • Open Access

    ARTICLE

    Hybrid Dynamic Optimization for Multilevel Security System in Disseminating Confidential Information

    Shahina Anwarul1, Sunil Kumar2, Ashok Bhansali3, Hammam Alshazly4,*, Hany S. Hussein5,6

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3145-3163, 2023, DOI:10.32604/csse.2023.041061 - 09 November 2023

    Abstract Security systems are the need of the hour to protect data from unauthorized access. The dissemination of confidential information over the public network requires a high level of security. The security approach such as steganography ensures confidentiality, authentication, integrity, and non-repudiation. Steganography helps in hiding the secret data inside the cover media so that the attacker can be confused during the transmission process of secret data between sender and receiver. Therefore, we present an efficient hybrid security model that provides multifold security assurance. To this end, a rectified Advanced Encryption Standard (AES) algorithm is proposed More >

  • Open Access

    ARTICLE

    Quantum-Enhanced Blockchain: A Secure and Practical Blockchain Scheme

    Ang Liu1,2, Xiu-Bo Chen1,*, Gang Xu3, Zhuo Wang4, Xuefen Feng5, Huamin Feng6

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 259-277, 2023, DOI:10.32604/cmc.2023.039397 - 08 June 2023

    Abstract The rapid advancement of quantum technology poses significant security risks to blockchain systems. However, quantum technology can also provide solutions for enhancing blockchain security. In this paper, we propose a quantum-enhanced blockchain scheme to achieve a high level of security against quantum computing attacks. We first discuss quantum computing attacks on classic blockchains, including attacks on hash functions, digital signatures, and consensus mechanisms. We then introduce quantum technologies, such as a quantum hash function (QHF), a quantum digital signature (QDS), and proof of authority (PoA) consensus mechanism, into our scheme to improve the security of More >

  • Open Access

    ARTICLE

    Blockchain Mobile Wallet with Secure Offline Transactions

    Raed Saeed Rasheed1, Khalil Hamdi Ateyeh Al-Shqeerat2,*, Ahmed Salah Ghorab3, Fuad Salama AbuOwaimer4, Aiman Ahmed AbuSamra1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2905-2919, 2023, DOI:10.32604/cmc.2023.036691 - 31 March 2023

    Abstract There has been an increase in the adoption of mobile payment systems worldwide in the past few years. However, poor Internet connection in rural regions continues to be an obstacle to the widespread use of such technologies. On top of that, there are significant problems with the currently available offline wallets; for instance, the payee cannot verify the number of coins received without access to the Internet. Additionally, it has been demonstrated that some existing systems are susceptible to false token generation, and some do not even permit the user to divide the offline token… More >

  • Open Access

    ARTICLE

    Accelerating Falcon Post-Quantum Digital Signature Algorithm on Graphic Processing Units

    Seog Chung Seo1, Sang Woo An2, Dooho Choi3,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1963-1980, 2023, DOI:10.32604/cmc.2023.033910 - 06 February 2023

    Abstract Since 2016, the National Institute of Standards and Technology (NIST) has been performing a competition to standardize post-quantum cryptography (PQC). Although Falcon has been selected in the competition as one of the standard PQC algorithms because of its advantages in short key and signature sizes, its performance overhead is larger than that of other lattice-based cryptosystems. This study presents multiple methodologies to accelerate the performance of Falcon using graphics processing units (GPUs) for server-side use. Direct GPU porting significantly degrades performance because the Falcon reference codes require recursive functions in its sampling process. Thus, an… More >

  • Open Access

    ARTICLE

    A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

    Mouna Bedoui1,*, Belgacem Bouallegue1,2, Abdelmoty M. Ahmed2, Belgacem Hamdi1,3, Mohsen Machhout1, Mahmoud1, M. Khattab2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2177-2193, 2023, DOI:10.32604/csse.2023.026516 - 01 August 2022

    Abstract Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the… More >

  • Open Access

    ARTICLE

    A Secure and Efficient Signature Scheme for IoT in Healthcare

    Latika Kakkar1, Deepali Gupta1, Sarvesh Tanwar2, Sapna Saxena3, Khalid Alsubhi4, Divya Anand5, Irene Delgado Noya6,7, Nitin Goyal1,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6151-6168, 2022, DOI:10.32604/cmc.2022.023769 - 28 July 2022

    Abstract To provide faster access to the treatment of patients, healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient. There is a huge limitation in the sensing layer as the IoT devices here have low computational power, limited storage and less battery life. So, this huge amount of data needs to be stored on the cloud. The information and the data sensed by these devices is made accessible on the internet from where medical staff, doctors, relatives and family members can access this information. This helps… More >

  • Open Access

    ARTICLE

    A Secured Message Transmission Protocol for Vehicular Ad Hoc Networks

    A. F. M. Suaib Akhter1,*, A. F. M. Shahen Shah2, Mohiuddin Ahmed3, Nour Moustafa4, Unal Çavuşoğlu1, Ahmet Zengin1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 229-246, 2021, DOI:10.32604/cmc.2021.015447 - 22 March 2021

    Abstract Vehicular Ad hoc Networks (VANETs) become a very crucial addition in the Intelligent Transportation System (ITS). It is challenging for a VANET system to provide security services and parallelly maintain high throughput by utilizing limited resources. To overcome these challenges, we propose a blockchain-based Secured Cluster-based MAC (SCB-MAC) protocol. The nearby vehicles heading towards the same direction will form a cluster and each of the clusters has its blockchain to store and distribute the safety messages. The message which contains emergency information and requires Strict Delay Requirement (SDR) for transmission are called safety messages (SM).… More >

  • Open Access

    ARTICLE

    Data Security Storage Model of the Internet of Things Based on Blockchain

    Pingshui Wang1,2,*, Willy Susilo2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 213-224, 2021, DOI:10.32604/csse.2021.014541 - 23 December 2020

    Abstract With the development of information technology, the Internet of Things (IoT) has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet. The application of the IoT has brought great convenience to people’s production and life. However, the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them. The traditional centralized data storage and management model of the IoT is easy to cause transmission delay, single point of failure, privacy disclosure and other problems, and eventually leads to unpredictable behavior More >

Displaying 1-10 on page 1 of 10. Per Page