Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    ARTICLE

    Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs

    Nagaraju Pacharla, K. Srinivasa Reddy*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3089-3110, 2024, DOI:10.32604/cmc.2024.048133 - 15 May 2024

    Abstract With the recent technological developments, massive vehicular ad hoc networks (VANETs) have been established, enabling numerous vehicles and their respective Road Side Unit (RSU) components to communicate with one another. The best way to enhance traffic flow for vehicles and traffic management departments is to share the data they receive. There needs to be more protection for the VANET systems. An effective and safe method of outsourcing is suggested, which reduces computation costs by achieving data security using a homomorphic mapping based on the conjugate operation of matrices. This research proposes a VANET-based data outsourcing… More >

  • Open Access

    ARTICLE

    Efficient Technique for Image Cryptography Using Sudoku Keys

    M. A. P. Manimekalai1, M. Karthikeyan1, I. Thusnavis Bella Mary1, K. Martin Sagayam1, Ahmed A Elngar2, Unai Fernandez-Gamiz3, Hatıra Günerhan4,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1325-1353, 2023, DOI:10.32604/cmc.2023.035856 - 31 October 2023

    Abstract This paper proposes a cryptographic technique on images based on the Sudoku solution. Sudoku is a number puzzle, which needs applying defined protocols and filling the empty boxes with numbers. Given a small size of numbers as input, solving the sudoku puzzle yields an expanded big size of numbers, which can be used as a key for the Encryption/Decryption of images. In this way, the given small size of numbers can be stored as the prime key, which means the key is compact. A prime key clue in the sudoku puzzle always leads to only… More >

  • Open Access

    ARTICLE

    A New Sine-Ikeda Modulated Chaotic Key for Cybersecurity

    S. Hanis*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 865-878, 2023, DOI:10.32604/iasc.2023.030597 - 29 September 2022

    Abstract In the recent past, the storage of images and data in the cloud has shown rapid growth due to the tremendous usage of multimedia applications. In this paper, a modulated version of the Ikeda map and key generation algorithm are proposed, which can be used as a chaotic key for securely storing images in the cloud. The distinctive feature of the proposed map is that it is hyperchaotic, highly sensitive to initial conditions, and depicts chaos over a wide range of control parameter variations. These properties prevent the attacker from detecting and extracting the keys… More >

  • Open Access

    ARTICLE

    User Interface-Based Repeated Sequence Detection Method for Authentication

    Shin Jin Kang1, Soo Kyun Kim2,*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 2573-2588, 2023, DOI:10.32604/iasc.2023.029893 - 17 August 2022

    Abstract In this paper, we propose an authentication method that use mouse and keystroke dynamics to enhance online privacy and security. The proposed method identifies personalized repeated user interface (UI) sequences by analyzing mouse and keyboard data. To this end, an Apriori algorithm based on the keystroke-level model (KLM) of the human–computer interface domain was used. The proposed system can detect repeated UI sequences based on KLM for authentication in the software. The effectiveness of the proposed method is verified through access testing using commercial applications that require intensive UI interactions. The results show using our More >

  • Open Access

    ARTICLE

    Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics

    Purvashi Baynath, Sunjiv Soyjaudah, Maleika Heenaye-Mamode Khan

    Intelligent Automation & Soft Computing, Vol.25, No.4, pp. 651-661, 2019, DOI:10.31209/2018.100000060

    Abstract The goal of this paper is (i) adopt fusion of features (ii) determine the best method of feature selection technique among ant Colony optimisation, artificial bee colony optimisation and genetic algorithm. The experimental results reported that ant colony Optimisation is a promising techniques as feature selection on Keystroke Dynamics as it outperforms in terms of recognition rate for our inbuilt database where the distance between the keys has been considered for the password derivation with recognition rate 97.85%. Finally the results have shown that a small improvement is obtained by fused features, which suggest that More >

Displaying 1-10 on page 1 of 5. Per Page