Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (302)
  • Open Access

    ARTICLE

    A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain

    Meng-Wei Zhang1, Xiu-Bo Chen1, Haseeb Ahmad2, Gang Xu3,4,*, Yi-Xian Yang1

    Journal of Cyber Security, Vol.4, No.1, pp. 29-39, 2022, DOI:10.32604/jcs.2022.027693

    Abstract Blockchain has a profound impact on all areas of society by virtue of its immutability, decentralization and other characteristics. However, blockchain faces the problem of data privacy leakage during the application process, and the rapid development of quantum computing also brings the threat of quantum attack to blockchain. In this paper, we propose a lattice-based certificateless fully homomorphic encryption (LCFHE) algorithm based on approximate eigenvector firstly. And we use the lattice-based delegate algorithm and preimage sampling algorithm to extract part of the private key based on certificateless scheme, which is composed of the private key together with the secret value… More >

  • Open Access

    ARTICLE

    A Searchable Encryption Scheme Based on Lattice for Log Systems in Blockchain

    Gang Xu1, Yibo Cao1, Shiyuan Xu1, Xin Liu2,*, Xiu-Bo Chen3, Yiying Yu1, Xiaojun Wang4

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5429-5441, 2022, DOI:10.32604/cmc.2022.028562

    Abstract With the increasing popularity of cloud storage, data security on the cloud has become increasingly visible. Searchable encryption has the ability to realize the privacy protection and security of data in the cloud. However, with the continuous development of quantum computing, the standard Public-key Encryption with Keyword Search (PEKS) scheme cannot resist quantum-based keyword guessing attacks. Further, the credibility of the server also poses a significant threat to the security of the retrieval process. This paper proposes a searchable encryption scheme based on lattice cryptography using blockchain to address the above problems. Firstly, we design a lattice-based encryption primitive to… More >

  • Open Access

    ARTICLE

    A Blockchain-Based Framework for Secure Storage and Sharing of Resumes

    Huanrong Tang1, Changlin Hu1, Tianming Liu2, Jianquan Ouyang1,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5395-5413, 2022, DOI:10.32604/cmc.2022.028284

    Abstract In response to problems in the centralized storage of personal resumes on third-party recruitment platforms, such as inadequate privacy protection, inability of individuals to accurately authorize downloads, and inability to determine who downloaded the resume and when, this study proposes a blockchain-based framework for secure storage and sharing of resumes. Users can employ an authorized access mechanism to protect their privacy rights. The proposed framework uses smart contracts, interplanetary file system, symmetric encryption, and digital signatures to protect, verify, and share resumes. Encryption keys are split and stored in multiple depositories through secret-sharing technology to improve the security of these… More >

  • Open Access

    ARTICLE

    CWoT-Share: Context-Based Web of Things Resource Sharing in Blockchain Environment

    Yangqun Li1,2,*, Jin Qi1,2, Lijuan Min1,2, Hongzhi Yang1,2, Chenyang Zhou1,2, Bonan Jin3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5079-5098, 2022, DOI:10.32604/cmc.2022.027281

    Abstract Web of Things (WoT) resources are not only numerous, but also have a wide range of applications and deployments. The centralized WoT resource sharing mechanism lacks flexibility and scalability, and hence cannot satisfy requirement of distributed resource sharing in large-scale environment. In response to this problem, a trusted and secure mechanism for WoT resources sharing based on context and blockchain (CWoT-Share) was proposed. Firstly, the mechanism can respond quickly to the changes of the application environment by dynamically determining resource access control rules according to the context. Then, the flexible resource charging strategies, which reduced the fees paid by the… More >

  • Open Access

    ARTICLE

    Evidence Mechanism of Power Dispatching Instruction Based on Blockchain

    Jian Geng1,*, Shaoyuan Yu1, Ailin Chen1, Hao Wang2, Bo Yan3, Liang Li3, Lei Song3, Qirun Wang4

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 559-571, 2022, DOI:10.32604/csse.2022.026948

    Abstract With the development and application of energy Internet technology, the collaborative interaction of “source network, load and storage” has become the development trend of power grid dispatching. The large-scale access of renewable energy on the load side, the unified management of adjustable loads, and the participation of multiple parties in energy operations have put forward requirements for the safety, credibility, openness, and transparency of the load dispatching environment. Under the environment of carbon emission reduction, the paper proposed an architecture of the scheduling data blockchain, based on the in-depth study of blockchain. Moreover, smart contracts are used to realize the… More >

  • Open Access

    ARTICLE

    Blockchain for Education: Verification and Management of Lifelong Learning Data

    Ba-Lam Do*, Van-Thanh Nguyen, Hoang-Nam Dinh, Thanh-Chung Dao, BinhMinh Nguyen

    Computer Systems Science and Engineering, Vol.43, No.2, pp. 591-604, 2022, DOI:10.32604/csse.2022.023508

    Abstract In recent years, blockchain technology has been applied in the educational domain because of its salient advantages, i.e., transparency, decentralization, and immutability. Available systems typically use public blockchain networks such as Ethereum and Bitcoin to store learning results. However, the cost of writing data on these networks is significant, making educational institutions limit data sent to the target network, typically containing only hash codes of the issued certificates. In this paper, we present a system based on a private blockchain network for lifelong learning data authentication and management named B4E (Blockchain For Education). B4E stores not only certificates but also… More >

  • Open Access

    ARTICLE

    Blockchain-based Distributed Power Market Trading Mechanism

    Dongjun Cui1,*, Jinghan He2, Guofang Zhang3, Zihan Hou4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2845-2858, 2022, DOI:10.32604/cmc.2022.026568

    Abstract Distributed power market trading has the characteristics of large number of participants, scattered locations, small single trading scale, and point-to-point trading. The traditional centralized power trading model has the problems of large load, low efficiency, high cost, reliance on third parties and unreliable data. With the characteristics of decentralization and non-tampering, blockchain can establish a point-to-point trusted trading environment and provide effective solutions to the above problems. Therefore, this paper proposed a distributed power market trading framework based on blockchain. In this framework, the distributed power supply characteristics and trading needs of each participant are analyzed, a complete distributed trading… More >

  • Open Access

    ARTICLE

    An Efficient Security Solution for Industrial Internet of Things Applications

    Alaa Omran Almagrabi*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3961-3983, 2022, DOI:10.32604/cmc.2022.026513

    Abstract The Industrial Internet of Things (IIoT) has been growing for presentations in industry in recent years. Security for the IIoT has unavoidably become a problem in terms of creating safe applications. Due to continual needs for new functionality, such as foresight, the number of linked devices in the industrial environment increases. Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments. Hence this blockchain-based endpoint protection platform (BCEPP) has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints. A resolver supports the… More >

  • Open Access

    ARTICLE

    Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home

    Anusha Vangala1, Ashok Kumar Das1, YoungHo Park2,*, Sajjad Shaukat Jamal3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3549-3570, 2022, DOI:10.32604/cmc.2022.025660

    Abstract The recent surge in development of smart homes and smart cities can be observed in many developed countries. While the idea to control devices that are in home (embedded with the Internet of Things (IoT) smart devices) by the user who is outside the home might sound fancy, but it comes with a lot of potential threats. There can be many attackers who will be trying to take advantage of this. So, there is a need for designing a secure scheme which will be able to distinguish among genuine/authorized users of the system and attackers. And knowing about the details… More >

  • Open Access

    ARTICLE

    Effective Classification of Synovial Sarcoma Cancer Using Structure Features and Support Vectors

    P. Arunachalam1, N. Janakiraman1, Junaid Rashid2, Jungeun Kim2,*, Sovan Samanta3, Usman Naseem4, Arun Kumar Sivaraman5, A. Balasundaram6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2521-2543, 2022, DOI:10.32604/cmc.2022.025339

    Abstract In this research work, we proposed a medical image analysis framework with two separate releases whether or not Synovial Sarcoma (SS) is the cell structure for cancer. Within this framework the histopathology images are decomposed into a third-level sub-band using a two-dimensional Discrete Wavelet Transform. Subsequently, the structure features (SFs) such as Principal Components Analysis (PCA), Independent Components Analysis (ICA) and Linear Discriminant Analysis (LDA) were extracted from this sub-band image representation with the distribution of wavelet coefficients. These SFs are used as inputs of the Support Vector Machine (SVM) classifier. Also, classification of PCA + SVM, ICA + SVM,… More >

Displaying 181-190 on page 19 of 302. Per Page