Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (409)
  • Open Access

    REVIEW

    A Data-Driven Systematic Review of the Metaverse in Transportation: Current Research, Computational Modeling, and Future Trends

    Cecilia Castro1, Victor Leiva2,*, Franco Basso2,3

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1481-1543, 2025, DOI:10.32604/cmes.2025.067992 - 31 August 2025

    Abstract Metaverse technologies are increasingly promoted as game-changers in transport planning, connected-autonomous mobility, and immersive traveler services. However, the field lacks a systematic review of what has been achieved, where critical technical gaps remain, and where future deployments should be integrated. Using a transparent protocol-driven screening process, we reviewed 1589 records and retained 101 peer-reviewed journal and conference articles (2021–2025) that explicitly frame their contributions within a transport-oriented metaverse. Our review reveals a predominantly exploratory evidence base. Among the 101 studies reviewed, 17 (16.8%) apply fuzzy multi-criteria decision-making, 36 (35.6%) feature digital-twin visualizations or simulation-based testbeds,… More > Graphic Abstract

    A Data-Driven Systematic Review of the Metaverse in Transportation: Current Research, Computational Modeling, and Future Trends

  • Open Access

    REVIEW

    Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission

    Michael Juma Ayuma1,*, Shem Mbandu Angolo1, Philemon Nthenge Kasyoka2, Simon Maina Karume3

    Journal of Cyber Security, Vol.7, pp. 307-341, 2025, DOI:10.32604/jcs.2025.067360 - 02 September 2025

    Abstract Token transmission is a fundamental component in diverse domains, including computer networks, blockchain systems, distributed architectures, financial transactions, secure communications, and identity verification. Ensuring optimal performance during transmission is essential for maintaining the efficiency of data in transit. However, persistent threats from adversarial actors continue to pose significant risks to the integrity, authenticity, and confidentiality of transmitted data. This study presents a comprehensive review of existing research on token transmission techniques, examining the roles of transmission channels, emerging trends, and the associated security and performance implications. A critical analysis is conducted to assess the strengths, More >

  • Open Access

    ARTICLE

    Quantum-Resilient Blockchain for Secure Digital Identity Verification in DeFi

    Ahmed I. Alutaibi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 875-903, 2025, DOI:10.32604/cmc.2025.067078 - 29 August 2025

    Abstract The rapid evolution of quantum computing poses significant threats to traditional cryptographic schemes, particularly in Decentralized Finance (DeFi) systems that rely on legacy mechanisms like RSA and ECDSA for digital identity verification. This paper proposes a quantum-resilient, blockchain-based identity verification framework designed to address critical challenges in privacy preservation, scalability, and post-quantum security. The proposed model integrates Post-quantum Cryptography (PQC), specifically lattice-based cryptographic primitives, with Decentralized Identifiers (DIDs) and Zero-knowledge Proofs (ZKPs) to ensure verifiability, anonymity, and resistance to quantum attacks. A dual-layer architecture is introduced, comprising an identity layer for credential generation and validation,… More >

  • Open Access

    ARTICLE

    Decentralized Authentication and Secure Distributed File Storage for Healthcare Systems Using Blockchain and IPFS

    Maazen Alsabaan1, Jasmin Praful Bharadiya2, Vishwanath Eswarakrishnan3, Adnan Mustafa Cheema4, Zaid Bin Faheem5, Jehad Ali6,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1135-1160, 2025, DOI:10.32604/cmc.2025.066969 - 29 August 2025

    Abstract The healthcare sector involves many steps to ensure efficient care for patients, such as appointment scheduling, consultation plans, online follow-up, and more. However, existing healthcare mechanisms are unable to facilitate a large number of patients, as these systems are centralized and hence vulnerable to various issues, including single points of failure, performance bottlenecks, and substantial monetary costs. Furthermore, these mechanisms are unable to provide an efficient mechanism for saving data against unauthorized access. To address these issues, this study proposes a blockchain-based authentication mechanism that authenticates all healthcare stakeholders based on their credentials. Furthermore, also… More >

  • Open Access

    ARTICLE

    EdgeGuard-IoT: 6G-Enabled Edge Intelligence for Secure Federated Learning and Adaptive Anomaly Detection in Industry 5.0

    Mohammed Naif Alatawi*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 695-727, 2025, DOI:10.32604/cmc.2025.066606 - 29 August 2025

    Abstract Adaptive robust secure framework plays a vital role in implementing intelligent automation and decentralized decision making of Industry 5.0. Latency, privacy risks and the complexity of industrial networks have been preventing attempts at traditional cloud-based learning systems. We demonstrate that, to overcome these challenges, for instance, the EdgeGuard-IoT framework, a 6G edge intelligence framework enhancing cybersecurity and operational resilience of the smart grid, is needed on the edge to integrate Secure Federated Learning (SFL) and Adaptive Anomaly Detection (AAD). With ultra-reliable low latency communication (URLLC) of 6G, artificial intelligence-based network orchestration, and massive machine type… More >

  • Open Access

    ARTICLE

    Blockchain Sharding Algorithm Based on Account Degree and Frequency

    Jiao Li, Xiaoyu Song*

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5239-5254, 2025, DOI:10.32604/cmc.2025.065504 - 30 July 2025

    Abstract The long transaction latency and low throughput of blockchain are the key challenges affecting the large-scale adoption of blockchain technology. Sharding technology is a primary solution by divides the blockchain network into multiple independent shards for parallel transaction processing. However, most existing random or modular schemes fail to consider the transactional relationships between accounts, which leads to a high proportion of cross-shard transactions, thereby increasing the communication overhead and transaction confirmation latency between shards. To solve this problem, this paper proposes a blockchain sharding algorithm based on account degree and frequency (DFSA). The algorithm takes… More >

  • Open Access

    ARTICLE

    Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification

    Rim Amdouni1,2,*, Mahdi Madani3, Mohamed Ali Hajjaji1,4, El Bay Bourennane3, Mohamed Atri5

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5527-5553, 2025, DOI:10.32604/cmc.2025.065356 - 30 July 2025

    Abstract Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector. In the context of security, this paper proposes a novel encryption algorithm that integrates Blockchain technology, aiming to improve the security and privacy of transmitted data. The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps: The logistic Map, the Tent Map, and the Henon Map used to generate three encryption keys. The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.… More >

  • Open Access

    REVIEW

    Navigating the Blockchain Trilemma: A Review of Recent Advances and Emerging Solutions in Decentralization, Security, and Scalability Optimization

    Saha Reno1,#,*, Koushik Roy2,#

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2061-2119, 2025, DOI:10.32604/cmc.2025.066366 - 03 July 2025

    Abstract The blockchain trilemma—balancing decentralization, security, and scalability—remains a critical challenge in distributed ledger technology. Despite significant advancements, achieving all three attributes simultaneously continues to elude most blockchain systems, often forcing trade-offs that limit their real-world applicability. This review paper synthesizes current research efforts aimed at resolving the trilemma, focusing on innovative consensus mechanisms, sharding techniques, layer-2 protocols, and hybrid architectural models. We critically analyze recent breakthroughs, including Directed Acyclic Graph (DAG)-based structures, cross-chain interoperability frameworks, and zero-knowledge proof (ZKP) enhancements, which aim to reconcile scalability with robust security and decentralization. Furthermore, we evaluate the trade-offs More >

  • Open Access

    ARTICLE

    Unleashing the Potential of Metaverse in Social IoV: An Authentication Protocol Based on Blockchain

    Tsu-Yang Wu1,2,3, Haozhi Wu3, Maoxin Tang1,2, Saru Kumari4, Chien-Ming Chen1,2,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3175-3192, 2025, DOI:10.32604/cmc.2025.065717 - 03 July 2025

    Abstract As a model for the next generation of the Internet, the metaverse—a fully immersive, hyper-temporal virtual shared space—is transitioning from imagination to reality. At present, the metaverse has been widely applied in a variety of fields, including education, social entertainment, Internet of vehicles (IoV), healthcare, and virtual tours. In IoVs, researchers primarily focus on using the metaverse to improve the traffic safety of vehicles, while paying limited attention to passengers’ social needs. At the same time, Social Internet of Vehicles (SIoV) introduces the concept of social networks in IoV to provide better resources and services… More >

  • Open Access

    REVIEW

    A Survey on Artificial Intelligence and Blockchain Clustering for Enhanced Security in 6G Wireless Networks

    A. F. M. Shahen Shah1,*, Muhammet Ali Karabulut2, Abu Kamruzzaman3, Dalal Alharthi4, Phillip G. Bradford5

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 1981-2013, 2025, DOI:10.32604/cmc.2025.064028 - 03 July 2025

    Abstract The advent of 6G wireless technology, which offers previously unattainable data rates, very low latency, and compatibility with a wide range of communication devices, promises to transform the networking environment completely. The 6G wireless proposals aim to expand wireless communication’s capabilities well beyond current levels. This technology is expected to revolutionize how we communicate, connect, and use the power of the digital world. However, maintaining secure and efficient data management becomes crucial as 6G networks grow in size and complexity. This study investigates blockchain clustering and artificial intelligence (AI) approaches to ensure a reliable and… More >

Displaying 31-40 on page 4 of 409. Per Page