Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    ILSM: Incorporated Lightweight Security Model for Improving QOS in WSN

    Ansar Munir Shah1, Mohammed Aljubayri2, Muhammad Faheem Khan1, Jarallah Alqahtani2,*, Mahmood ul Hassan3, Adel Sulaiman2, Asadullah Shaikh2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2471-2488, 2023, DOI:10.32604/csse.2023.034951 - 09 February 2023

    Abstract In the network field, Wireless Sensor Networks (WSN) contain prolonged attention due to afresh augmentations. Industries like health care, traffic, defense, and many more systems espoused the WSN. These networks contain tiny sensor nodes containing embedded processors, Tiny OS, memory, and power source. Sensor nodes are responsible for forwarding the data packets. To manage all these components, there is a need to select appropriate parameters which control the quality of service of WSN. Multiple sensor nodes are involved in transmitting vital information, and there is a need for secure and efficient routing to reach the… More >

  • Open Access

    ARTICLE

    A Linear Homomorphic Proxy Signature Scheme Based on Blockchain for Internet of Things

    Caifen Wang1,*, Bin Wu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1857-1878, 2023, DOI:10.32604/cmes.2023.026153 - 06 February 2023

    Abstract The mushroom growth of IoT has been accompanied by the generation of massive amounts of data. Subject to the limited storage and computing capabilities of most IoT devices, a growing number of institutions and organizations outsource their data computing tasks to cloud servers to obtain efficient and accurate computation while avoiding the cost of local data computing. One of the most important challenges facing outsourcing computing is how to ensure the correctness of computation results. Linearly homomorphic proxy signature (LHPS) is a desirable solution to ensure the reliability of outsourcing computing in the case of… More >

  • Open Access

    ARTICLE

    Enhanced Security with Improved Defensive Routing Mechanism in Wireless Sensor Networks

    R. Sabitha1,*, C. Gokul Prasad2, S. Karthik1

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2795-2810, 2023, DOI:10.32604/csse.2023.026465 - 21 December 2022

    Abstract In recent scenario of Wireless Sensor Networks (WSNs), there are many application developed for handling sensitive and private data such as military information, surveillance data, tracking, etc. Hence, the sensor nodes of WSNs are distributed in an intimidating region, which is non-rigid to attacks. The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats. In traditional models, the solution has been made for defending the networks, only to specific attacks. However, in real-time applications, the kind of attack that is launched by the adversary is not… More >

  • Open Access

    ARTICLE

    Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model

    Hanan Abdullah Mengash1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Fahd N. Al-Wesabi4, Abdullah Mohamed5, Manar Ahmed Hamza6,*, Radwa Marzouk7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1393-1407, 2023, DOI:10.32604/csse.2023.030328 - 03 November 2022

    Abstract Presently, smart cities play a vital role to enhance the quality of living among human beings in several ways such as online shopping, e-learning, e-healthcare, etc. Despite the benefits of advanced technologies, issues are also existed from the transformation of the physical word into digital word, particularly in online social networks (OSN). Cyberbullying (CB) is a major problem in OSN which needs to be addressed by the use of automated natural language processing (NLP) and machine learning (ML) approaches. This article devises a novel search and rescue optimization with machine learning enabled cybersecurity model for… More >

  • Open Access

    ARTICLE

    Cloud Security Service for Identifying Unauthorized User Behaviour

    D. Stalin David1, Mamoona Anam2, Chandraprabha Kaliappan3, S. Arun Mozhi Selvi4, Dilip Kumar Sharma5, Pankaj Dadheech6, Sudhakar Sengan7,*

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 2581-2600, 2022, DOI:10.32604/cmc.2022.020213 - 27 September 2021

    Abstract Recently, an innovative trend like cloud computing has progressed quickly in Information Technology. For a background of distributed networks, the extensive sprawl of internet resources on the Web and the increasing number of service providers helped cloud computing technologies grow into a substantial scaled Information Technology service model. The cloud computing environment extracts the execution details of services and systems from end-users and developers. Additionally, through the system’s virtualization accomplished using resource pooling, cloud computing resources become more accessible. The attempt to design and develop a solution that assures reliable and protected authentication and authorization More >

  • Open Access

    ARTICLE

    Information Flow Security Models for Cloud Computing

    Congdong Lv1, *, Ji Zhang2, Zhoubao Sun1, Gang Qian1

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2687-2705, 2020, DOI:10.32604/cmc.2020.011232 - 16 September 2020

    Abstract Cloud computing provides services to users through Internet. This open mode not only facilitates the access by users, but also brings potential security risks. In cloud computing, the risk of data leakage exists between users and virtual machines. Whether direct or indirect data leakage, it can be regarded as illegal information flow. Methods, such as access control models can control the information flow, but not the covert information flow. Therefore, it needs to use the noninterference models to detect the existence of illegal information flow in cloud computing architecture. Typical noninterference models are not suitable… More >

  • Open Access

    ARTICLE

    An Efficient and Practical Quantum Blind Signature Protocol with Relaxed Security Model

    Jun Zhang1, *, Hao Xiao2, Hongqun Zhai1, Xiaoli Meng3

    CMC-Computers, Materials & Continua, Vol.63, No.1, pp. 301-313, 2020, DOI:10.32604/cmc.2020.07681 - 30 March 2020

    Abstract Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness. Owing to the potential unconditional security, quantum blind signature (QBS) is more advantageous than the classical ones. In this paper, an efficient and practical quantum blind signature scheme relaxed security model is presented, where quantum superposition, decoy qubits and hash function are used for the purpose of blindness. Compared with previous QBS scheme, the presented scheme is more efficient and practical with a relaxed More >

Displaying 1-10 on page 1 of 7. Per Page