Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies

    Waseem Akram1, Khalid Mahmood2, Hafiz Burhan ul Haq3, Muhammad Asif3, Shehzad Ashraf Chaudhry4,5, Taeshik Shon6,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 263-280, 2024, DOI:10.32604/cmc.2024.052405 - 18 July 2024

    Abstract Cookies are considered a fundamental means of web application services for authenticating various Hypertext Transfer Protocol (HTTP) requests and maintains the states of clients’ information over the Internet. HTTP cookies are exploited to carry client patterns observed by a website. These client patterns facilitate the particular client’s future visit to the corresponding website. However, security and privacy are the primary concerns owing to the value of information over public channels and the storage of client information on the browser. Several protocols have been introduced that maintain HTTP cookies, but many of those fail to achieve More >

  • Open Access

    ARTICLE

    Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing

    V. Balaji, P. Selvaraj*

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2015-2027, 2023, DOI:10.32604/iasc.2023.029260 - 19 July 2022

    Abstract Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers. It facilitates the benefits of the network edge with the maximized probability of offering interaction with the cloud. However, the fog computing characteristics are susceptible to counteract the challenges of security. The issues present with the Physical Layer Security (PLS) aspect in fog computing which included authentication, integrity, and confidentiality has been considered as a reason for the potential issues leading to the security breaches. In this work, the Octonion Algebra-inspired Non- Commutative… More >

  • Open Access

    ARTICLE

    Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet

    Muhamad Erza Aminanto1,2,*, Ibnu Rifqi Purbomukti3, Harry Chandra2, Kwangjo Kim4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5301-5314, 2022, DOI:10.32604/cmc.2022.026749 - 21 April 2022

    Abstract Internet of Things (IoT) networks leverage wireless communication protocols, which adversaries can exploit. Impersonation attacks, injection attacks, and flooding are several examples of different attacks existing in Wi-Fi networks. Intrusion Detection System (IDS) became one solution to distinguish those attacks from benign traffic. Deep learning techniques have been intensively utilized to classify the attacks. However, the main issue of utilizing deep learning models is projecting the data, notably tabular data, into an image. This study proposes a novel projection from wireless network attacks data into a grid-based image for feeding one of the Convolutional Neural… More >

  • Open Access

    ARTICLE

    An Efficient Impersonation Attack Detection Method in Fog Computing

    Jialin Wan1, Muhammad Waqas1,2, Shanshan Tu1,*, Syed Mudassir Hussain3, Ahsan Shah2, Sadaqat Ur Rehman4, Muhammad Hanif2

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 267-281, 2021, DOI:10.32604/cmc.2021.016260 - 22 March 2021

    Abstract Fog computing paradigm extends computing, communication, storage, and network resources to the network’s edge. As the fog layer is located between cloud and end-users, it can provide more convenience and timely services to end-users. However, in fog computing (FC), attackers can behave as real fog nodes or end-users to provide malicious services in the network. The attacker acts as an impersonator to impersonate other legitimate users. Therefore, in this work, we present a detection technique to secure the FC environment. First, we model a physical layer key generation based on wireless channel characteristics. To generate More >

Displaying 1-10 on page 1 of 4. Per Page