Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (298)
  • Open Access

    ARTICLE

    A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain

    Shujiang Xu1,2,*, Ziye Wang1,2, Lianhai Wang1,2, Miodrag J. Mihaljević1,2,3, Shuhui Zhang1,2, Wei Shao1,2, Qizheng Wang1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3311-3327, 2024, DOI:10.32604/cmes.2023.046164

    Abstract Blockchain technology, with its attributes of decentralization, immutability, and traceability, has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business processes. However, transaction performance and scalability has become the main challenges hindering the widespread adoption of blockchain. Due to its inability to meet the demands of high-frequency trading, blockchain cannot be adopted in many scenarios. To improve the transaction capacity, researchers have proposed some on-chain scaling technologies, including lightning networks, directed acyclic graph technology, state channels, and sharding mechanisms, in which sharding emerges as a potential scaling technology. Nevertheless, excessive cross-shard transactions and uneven shard… More > Graphic Abstract

    A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain

  • Open Access

    ARTICLE

    Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology

    Nazik Alturki1, Raed Alharthi2, Muhammad Umer3,*, Oumaima Saidani1, Amal Alshardan1, Reemah M. Alhebshi4, Shtwai Alsubai5, Ali Kashif Bashir6,7,8,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3387-3415, 2024, DOI:10.32604/cmes.2023.044700

    Abstract The concept of smart houses has grown in prominence in recent years. Major challenges linked to smart homes are identification theft, data safety, automated decision-making for IoT-based devices, and the security of the device itself. Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features. This paper proposes a smart home system based on ensemble learning of random forest (RF) and convolutional neural networks (CNN) for programmed decision-making tasks, such as categorizing gadgets as “OFF” or “ON” based… More >

  • Open Access

    ARTICLE

    NFT Security Matrix: Towards Modeling NFT Ecosystem Threat

    Peng Liao1, Chaoge Liu2, Jie Yin1,3,*, Zhi Wang2, Xiang Cui2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3255-3285, 2024, DOI:10.32604/cmes.2024.043855

    Abstract Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens (NFTs). To be specific, the total trading volume of digital assets reached an astounding $55.5 billion in 2022. Nevertheless, numerous security concerns have been raised by the rapid expansion of the NFT ecosystem. NFT holders are exposed to a plethora of scams and traps, putting their digital assets at risk of being lost. However, academic research on NFT security is scarce, and the security issues have aroused rare attention. In this study, the NFT ecological process is comprehensively explored. This process falls into five different… More >

  • Open Access

    ARTICLE

    Blockchain-Based Certificateless Bidirectional Authenticated Searchable Encryption Scheme in Cloud Email System

    Yanzhong Sun1, Xiaoni Du1,*, Shufen Niu2, Xiaodong Yang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 3287-3310, 2024, DOI:10.32604/cmes.2023.043589

    Abstract Traditional email systems can only achieve one-way communication, which means only the receiver is allowed to search for emails on the email server. In this paper, we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption (CL-BSE) by combining the storage function of cloud server with the communication function of email server. In the new model, not only can the data receiver search for the relevant content by generating its own trapdoor, but the data owner also can retrieve the content in the same way. Meanwhile, there are dual… More >

  • Open Access

    REVIEW

    A Survey on Blockchain-Based Federated Learning: Categorization, Application and Analysis

    Yuming Tang1,#, Yitian Zhang2,#, Tao Niu1, Zhen Li2,3,*, Zijian Zhang1,3, Huaping Chen4, Long Zhang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2451-2477, 2024, DOI:10.32604/cmes.2024.030084

    Abstract Federated Learning (FL), as an emergent paradigm in privacy-preserving machine learning, has garnered significant interest from scholars and engineers across both academic and industrial spheres. Despite its innovative approach to model training across distributed networks, FL has its vulnerabilities; the centralized server-client architecture introduces risks of single-point failures. Moreover, the integrity of the global model—a cornerstone of FL—is susceptible to compromise through poisoning attacks by malicious actors. Such attacks and the potential for privacy leakage via inference starkly undermine FL’s foundational privacy and security goals. For these reasons, some participants unwilling use their private data to train a model, which… More >

  • Open Access

    ARTICLE

    A Fair and Trusted Trading Scheme for Medical Data Based on Smart Contracts

    Xiaohui Yang, Kun Zhang*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1843-1859, 2024, DOI:10.32604/cmc.2023.047660

    Abstract Data is regarded as a valuable asset, and sharing data is a prerequisite for fully exploiting the value of data. However, the current medical data sharing scheme lacks a fair incentive mechanism, and the authenticity of data cannot be guaranteed, resulting in low enthusiasm of participants. A fair and trusted medical data trading scheme based on smart contracts is proposed, which aims to encourage participants to be honest and improve their enthusiasm for participation. The scheme uses zero-knowledge range proof for trusted verification, verifies the authenticity of the patient’s data and the specific attributes of the data before the transaction,… More >

  • Open Access

    ARTICLE

    Robust and Trustworthy Data Sharing Framework Leveraging On-Chain and Off-Chain Collaboration

    Jinyang Yu1,2, Xiao Zhang1,2,3,*, Jinjiang Wang1,2, Yuchen Zhang1,2, Yulong Shi1,2, Linxuan Su1,2, Leijie Zeng1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2159-2179, 2024, DOI:10.32604/cmc.2024.047340

    Abstract The proliferation of Internet of Things (IoT) systems has resulted in the generation of substantial data, presenting new challenges in reliable storage and trustworthy sharing. Conventional distributed storage systems are hindered by centralized management and lack traceability, while blockchain systems are limited by low capacity and high latency. To address these challenges, the present study investigates the reliable storage and trustworthy sharing of IoT data, and presents a novel system architecture that integrates on-chain and off-chain data manage systems. This architecture, integrating blockchain and distributed storage technologies, provides high-capacity, high-performance, traceable, and verifiable data storage and access. The on-chain system,… More >

  • Open Access

    ARTICLE

    FPSblo: A Blockchain Network Transmission Model Utilizing Farthest Point Sampling

    Longle Cheng1,2, Xiru Li1, Shiyu Fang2, Wansu Pan1, He Zhao1,*, Haibo Tan1, Xiaofeng Li1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2491-2509, 2024, DOI:10.32604/cmc.2024.047166

    Abstract Peer-to-peer (P2P) overlay networks provide message transmission capabilities for blockchain systems. Improving data transmission efficiency in P2P networks can greatly enhance the performance of blockchain systems. However, traditional blockchain P2P networks face a common challenge where there is often a mismatch between the upper-layer traffic requirements and the underlying physical network topology. This mismatch results in redundant data transmission and inefficient routing, severely constraining the scalability of blockchain systems. To address these pressing issues, we propose FPSblo, an efficient transmission method for blockchain networks. Our inspiration for FPSblo stems from the Farthest Point Sampling (FPS) algorithm, a well-established technique widely… More >

  • Open Access

    ARTICLE

    A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture

    Yi-Bo Cao1,*, Xiu-Bo Chen1, Yun-Feng He2, Lu-Xi Liu2, Yin-Mei Che2, Xiao Wang2, Ke Xiao3, Gang Xu3, Si-Yi Chen1

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2813-2827, 2024, DOI:10.32604/cmc.2024.046816

    Abstract Due to the rapid advancements in network technology, blockchain is being employed for distributed data storage. In the Internet of Things (IoT) scenario, different participants manage multiple blockchains located in different trust domains, which has resulted in the extensive development of cross-domain authentication techniques. However, the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography, posing a significant security threat. In response to the aforementioned challenges, our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset… More >

  • Open Access

    ARTICLE

    An Energy Trading Method Based on Alliance Blockchain and Multi-Signature

    Hongliang Tian, Jiaming Wang*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1611-1629, 2024, DOI:10.32604/cmc.2023.046698

    Abstract Blockchain, known for its secure encrypted ledger, has garnered attention in financial and data transfer realms, including the field of energy trading. However, the decentralized nature and identity anonymity of user nodes raise uncertainties in energy transactions. The broadcast consensus authentication slows transaction speeds, and frequent single-point transactions in multi-node settings pose key exposure risks without protective measures during user signing. To address these, an alliance blockchain scheme is proposed, reducing the resource-intensive identity verification among nodes. It integrates multi-signature functionality to fortify user resources and transaction security. A novel multi-signature process within this framework involves neutral nodes established through… More >

Displaying 11-20 on page 2 of 298. Per Page