Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (9)
  • Open Access

    ARTICLE

    Study on Two-Tier EV Charging Station Recommendation Strategy under Multi-Factor Influence

    Miao Liu, Lei Feng, Yexun Yuan, Ye Liu, Peng Geng*

    Journal on Artificial Intelligence, Vol.5, pp. 181-193, 2023, DOI:10.32604/jai.2023.046066 - 28 December 2023

    Abstract This article aims to address the clustering effect caused by unorganized charging of electric vehicles by adopting a two-tier recommendation method. The electric vehicles (EVs) are classified into high-level alerts and general alerts based on their state of charge (SOC). EVs with high-level alerts have the most urgent charging needs, so the distance to charging stations is set as the highest priority for recommendations. For users with general alerts, a comprehensive EV charging station recommendation model is proposed, taking into account factors such as charging price, charging time, charging station preference, and distance to the More >

  • Open Access

    ARTICLE

    A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN

    Sugandhi Midha1, Sahil Verma1,*, Kavita1, Mohit Mittal2, Nz Jhanjhi3,4, Mehedi Masud5, Mohammed A. AlZain6

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3711-3726, 2023, DOI:10.32604/cmc.2023.027992 - 31 October 2022

    Abstract Cloud-based SDN (Software Defined Network) integration offers new kinds of agility, flexibility, automation, and speed in the network. Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement. The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services. It has improved the real-time monitoring of patients by medical practitioners. Patients’ data get stored at the central server on the cloud from where it is available to medical practitioners in no time. The centralisation of data on the… More >

  • Open Access

    ARTICLE

    A TMA-Seq2seq Network for Multi-Factor Time Series Sea Surface Temperature Prediction

    Qi He1, Wenlong Li1, Zengzhou Hao2, Guohua Liu3, Dongmei Huang1, Wei Song1,*, Huifang Xu4, Fayez Alqahtani5, Jeong-Uk Kim6

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 51-67, 2022, DOI:10.32604/cmc.2022.026771 - 18 May 2022

    Abstract Sea surface temperature (SST) is closely related to global climate change, ocean ecosystem, and ocean disaster. Accurate prediction of SST is an urgent and challenging task. With a vast amount of ocean monitoring data are continually collected, data-driven methods for SST time-series prediction show promising results. However, they are limited by neglecting complex interactions between SST and other ocean environmental factors, such as air temperature and wind speed. This paper uses multi-factor time series SST data to propose a sequence-to-sequence network with two-module attention (TMA-Seq2seq) for long-term time series SST prediction. Specifically, TMA-Seq2seq is an… More >

  • Open Access

    ARTICLE

    Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security

    Rashad Mahmood Saqib1, Adnan Shahid Khan1,*, Yasir Javed2, Shakil Ahmad2, Kashif Nisar3, Irshad A. Abbasi4, Muhammad Reazul Haque5, Azlina Ahmadi Julaihi1

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1633-1647, 2022, DOI:10.32604/iasc.2022.021786 - 09 December 2021

    Abstract This study presents the current state of research on multi-factor authentication. Authentication is one of the important traits in the security domain as it ensures that legitimate users have access to the secure resource. Attacks on authentication occur even before digital access is given, but it becomes quite challenging with remote access to secure resources. With increasing threats to single authentication schemes, 2Factor and later multi-factor authentication approaches came into practice. Several studies have been done in the multi-factor authentication discipline, and most of them proposed the best possible approaches, but there are very limited… More >

  • Open Access

    ARTICLE

    A Multi-Factor Authentication-Based Framework for Identity Management in Cloud Applications

    Wael Said1, Elsayed Mostafa1,*, M. M. Hassan1, Ayman Mohamed Mostafa2

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3193-3209, 2022, DOI:10.32604/cmc.2022.023554 - 07 December 2021

    Abstract User's data is considered as a vital asset of several organizations. Migrating data to the cloud computing is not an easy decision for any organization due to the privacy and security concerns. Service providers must ensure that both data and applications that will be stored on the cloud should be protected in a secure environment. The data stored on the public cloud will be vulnerable to outside and inside attacks. This paper provides interactive multi-layer authentication frameworks for securing user identities on the cloud. Different access control policies are applied for verifying users on the… More >

  • Open Access

    ARTICLE

    Multi-Factor Authentication for Secured Financial Transactions in Cloud Environment

    D. Prabakaran1,*, Shyamala Ramachandran2

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1781-1798, 2022, DOI:10.32604/cmc.2022.019591 - 07 September 2021

    Abstract The rise of the digital economy and the comfort of accessing by way of user mobile devices expedite human endeavors in financial transactions over the Virtual Private Network (VPN) backbone. This prominent application of VPN evades the hurdles involved in physical money exchange. The VPN acts as a gateway for the authorized user in accessing the banking server to provide mutual authentication between the user and the server. The security in the cloud authentication server remains vulnerable to the results of threat in JP Morgan Data breach in 2014, Capital One Data Breach in 2019,… More >

  • Open Access

    ARTICLE

    A Cache Replacement Policy Based on Multi-Factors for Named Data Networking

    Meiju Yu1, Ru Li1, *, Yuwen Chen2

    CMC-Computers, Materials & Continua, Vol.65, No.1, pp. 321-336, 2020, DOI:10.32604/cmc.2020.010831 - 23 July 2020

    Abstract Named Data Networking (NDN) is one of the most excellent future Internet architectures and every router in NDN has the capacity of caching contents passing by. It greatly reduces network traffic and improves the speed of content distribution and retrieval. In order to make full use of the limited caching space in routers, it is an urgent challenge to make an efficient cache replacement policy. However, the existing cache replacement policies only consider very few factors that affect the cache performance. In this paper, we present a cache replacement policy based on multi-factors for NDN… More >

  • Open Access

    ARTICLE

    Multi-Factor Password-Authenticated Key Exchange via Pythia PRF Service

    Zengpeng Li1, Jiuru Wang2, *, Chang Choi3, Wenyin Zhang2

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 663-674, 2020, DOI:10.32604/cmc.2020.06565 - 01 May 2020

    Abstract Multi-factor authentication (MFA) was proposed by Pointcheval et al. [Pointcheval and Zimmer (2008)] to improve the security of single-factor (and two-factor) authentication. As the backbone of multi-factor authentication, biometric data are widely observed. Especially, how to keep the privacy of biometric at the password database without impairing efficiency is still an open question. Using the vulnerability of encryption (or hash) algorithms, the attacker can still launch offline brute-force attacks on encrypted (or hashed) biometric data. To address the potential risk of biometric disclosure at the password database, in this paper, we propose a novel efficient More >

  • Open Access

    ARTICLE

    A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT

    Liang Kou1, Yiqi Shi2, Liguo Zhang1, Duo Liu1,*, Qing Yang3

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 545-565, 2019, DOI:10.32604/cmc.2019.03760

    Abstract With the development of computer hardware technology and network technology, the Internet of Things as the extension and expansion of traditional computing network has played an increasingly important role in all professions and trades and has had a tremendous impact on people lifestyle. The information perception of the Internet of Things plays a key role as a link between the computer world and the real world. However, there are potential security threats in the Perceptual Layer Network applied for information perception because Perceptual Layer Network consists of a large number of sensor nodes with weak More >

Displaying 1-10 on page 1 of 9. Per Page